The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
Gartner on Ransomware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
IDC on Endpoint Protection
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
Wed, 3rd Jul 2024
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Thu, 13th Jun 2024
Expert columns
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
This month
By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024
By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024
By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
Thu, 5th Sep 2024
By Raj Sivaraju of Arete
Ransomware trends: A threat to insurance business conti...
Tue, 13th Aug 2024
More expert columns
By Chaim Mazal of Gigamon
The 2024 Olympics’ unseen cyber competition
Thu, 8th Aug 2024
By Stephen Kho of Avast
You’re telling me that ad was fake? Malvertising is sne...
Thu, 8th Aug 2024
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Wed, 17th Jul 2024
By Mina Mousa of Extreme Networks
Adapting cybersecurity strategies to the escalating thr...
Mon, 1st Jul 2024
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Fri, 28th Jun 2024
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Thu, 20th Jun 2024
Top players
You can read more from the top players Check Point Software, Volution, Apple, Kaspersky, and Trend Micro.
Recent news
About Ransomware
Deepfake attacks seen as top cyber threat in Australia
Last week
About Identity Theft
Cybercriminals target Olympic Games & concerts in 2024
Last week
About Ransomware
Gen reports surge in ransomware & mobile threats
Last week
About Endpoint Protection
Bitdefender offers $1m warranty with MDR services
Last week
About Ransomware
Gen Q3 report reveals alarming rise in global cyber thr...
Last week
More news
About Cryptocurrency
North Korean operatives exposed in global tech job scam
Last week
About Endpoint Protection
Tenable discovers vulnerabilities in IaC & PaC platform...
Last week
About Firewalls
Check Point unveils AI-powered Quantum Firewall Softwar...
Last week
About Phishing
Cyberattack spreads malware via Facebook ads in Europe
Last week
About Security vulnerabilities
Critical needrestart vulnerabilities found in Ubuntu Se...
Last week
Even more news
About Unified Communications
CrowdStrike report reveals China-linked cyber threat ac...
Last week
About Ransomware
Gen's report reveals 614% surge in 'Scam-Yourself Attac...
Last week
About Endpoint Detection and Response
Australians warned of Black Friday online shopping scam...
Last week
About Data Protection
BlackFog unveils advanced platform for ransomware defen...
Last week
About Scams
Sextortion scams surge with personal data to extort mon...
Last week
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, Email Security, and Ransomware.
Powered by