The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

Frost & Sullivan on Gaming
Group-IB's fraud solution now accessible via AWS Market...
5 days ago

Miercom on Cloud Security
Check Point's Infinity Platform excels in new security ...
Last month

IDC MarketScape on Firewalls
Sophos MDR services protect 26,000 organisations global...
Tue, 14th Jan 2025

Gartner on Ransomware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024

Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
Expert columns

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Last week

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Thu, 19th Dec 2024

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024
More expert columns

By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Fri, 13th Dec 2024

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024

By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024

By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
Thu, 5th Sep 2024
Top players
Recent news

About Online Safety
Microsoft exposes phishing scam targeting Booking.com h...
Yesterday

About Security breaches
Medusa ransomware threat continues to challenge firms
Yesterday

About Firewalls
Mandiant uncovers UNC3886 cyber-attack on Juniper route...
2 days ago

About Aviation
UAE cyberattack exposes new Sosano malware by Proofpoin...
3 days ago

About Public Sector
Australian downtime costs climb to AUD $86 billion annu...
3 days ago
More news

About Collaboration
Microsoft & Fortra's joint fight against Cobalt Strike ...
3 days ago

About Ransomware
Rise in cyberattacks using legitimate RMM tools noted
3 days ago

About Cyber Threats
Advanced persistent threats rise by 74% in 2024 report
Last week

About Debit & Credit cards
Dark web leak: 2.3 million bank cards exposed online
Last week

About Data Protection
Small businesses targeted by cybercriminals on dark web
Last week
Even more news

About Scams
Cybercrime report reveals 58% surge in APT activity
Last month

About iOS
Appdome launches plugins to combat DeepSeek AI threats
Last month

About Cloud Services
Kaspersky uncovers malware attack in Asia-Pacific regio...
Last month

About Distributed Denial of Service
New report reveals cybersecurity risks in manufacturing
Last month

About Ransomware
Dragos report reveals rise in industrial cyber threats
Last month
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Email Security, Breach Prevention, and Ransomware.
Powered by