The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Last month
IDC on Endpoint Protection
Appdome unveils GenAI-powered Threat Resolution Center
Last month
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
Wed, 3rd Jul 2024
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Thu, 13th Jun 2024
Gartner on SaaS
Logpoint names Mikkel Drucker as new CEO to drive growt...
Thu, 30th May 2024
Expert columns
By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Today
By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Last week
By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
This month
By Raj Sivaraju of Arete
Ransomware trends: A threat to insurance business conti...
Last month
By Chaim Mazal of Gigamon
The 2024 Olympics’ unseen cyber competition
Last month
More expert columns
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Last month
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Wed, 17th Jul 2024
By Mina Mousa of Extreme Networks
Adapting cybersecurity strategies to the escalating thr...
Mon, 1st Jul 2024
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Thu, 20th Jun 2024
By Audra Simons of Everfox
Fighting back against the growing threat of ransomware
Mon, 17th Jun 2024
Top players
You can read more from the top players Recogni, Check Point Software, Apple, Trend Micro, and Kaspersky.
Recent news
About IT Training
Ministry, Indosat, Mastercard Launch Cybersecurity Onli...
4 days ago
About IT Training
Indonesia's Kominfo teams with Indosat & Mastercard for...
Last week
About Ransomware
AI-driven cybercrime spikes in Australia & NZ, warns Tr...
Last week
About Firewalls
Sophos unveils Chinese cyber espionage tactics in new r...
Last week
About Fraud
Bitdefender unveils first comprehensive security for cr...
Last week
More news
About Data Protection
Indosat launches IMSecure to bolster customer data prot...
This month
About Webinar
Dragos launches enhanced platform for OT threat detecti...
This month
About Gaming
Kaspersky uncovers Russian-led crypto & web3 fraud camp...
Last month
About Browsers
SquareX exposes SWG flaws at DEF CON, urges browser sec...
Last month
About Cyber Threats
ReliaQuest reveals top malware threats in 2024 Q2 analy...
Last month
Even more news
About iOS
Kaspersky outlines major cybersecurity challenges for 2...
Last month
About Report
FBI's Qakbot takedown reshapes 2024 malware loader land...
Last month
About Firewalls
Barracuda exposes advanced phishing attacks with new ma...
Last month
About EduTech
Australian survey reveals persistent cybersecurity thre...
Last month
About Cybersecurity
SentinelOne & Intezer join forces to tackle Rust malwar...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Ransomware, Advanced Persistent Threat Protection, and Email Security.
Powered by