The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

Miercom on Cloud Security
Check Point's Infinity Platform excels in new security ...
This month

IDC MarketScape on Firewalls
Sophos MDR services protect 26,000 organisations global...
Last month

Gartner on Ransomware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024

Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024

IDC on Endpoint Protection
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Expert columns

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Last month

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Last month

By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Thu, 19th Dec 2024

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Fri, 13th Dec 2024
More expert columns

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024

By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024

By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
Thu, 5th Sep 2024

By Raj Sivaraju of Arete
Ransomware trends: A threat to insurance business conti...
Tue, 13th Aug 2024
Top players
Recent news

About Cybercrime
Tenable warns of data risks from new AI model DeepSeek
2 days ago

About Spam
Kaspersky blocks over 893 million phishing attempts in ...
3 days ago

About Firewalls
Acronis report reveals 197% rise in email cyberattacks
4 days ago

About Digitalisation
Singapore reports record cyberattacks in Southeast Asia...
4 days ago

About BitCoin
Gen's report reveals surge in cyber threats for Q4 2024
4 days ago
More news

About Ransomware
AI-enhanced security tools unveiled by Check Point Soft...
5 days ago

About Hackers
LLMjacking exploits target AI models like DeepSeek, Exp...
Last week

About Multi-factor authentication
Microsoft 365 users face rising threat from Axios attac...
Last week

About Threat intelligence
Akamai unveils comprehensive cybersecurity guide for 20...
Last week

About Digital Transformation
Akamai releases Defenders’ Guide 2025 for APJ region
Last week
Even more news

About iOS
New SparkCat Trojan targets AppStore & Google Play user...
Last week

About Government
Fortra's 2025 cybersecurity survey: key risk findings
Last week

About Automation
Cyware partners with Team Cymru for enhanced threat fee...
Last week

About macOS
FlexibleFerret malware evades Apple's XProtect updates
Last week

About Threat intelligence
Bitdefender warns of cyber campaign in Central Asia, Eu...
Last week
Other guides
You can read other related guides from Cybersecurity, Email Security, Advanced Persistent Threat Protection, Breach Prevention, and Ransomware.
Powered by