The Ultimate Guide to Malware
2024 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
![Story image](../../../../../uploads/story/2024/07/03/preview_techday_4053fd8492221491acd5.webp)
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
This month
![Story image](../../../../../uploads/story/2024/06/13/preview_techday_a112af7a1c89156b40c5.webp)
IDC on Data Protection
Acronis launches comprehensive XDR solution for MSPs
Last month
![Story image](../../../../../uploads/story/2024/05/30/preview_Mikkel_Drucker__Logpoint_CEO.webp)
Gartner on SaaS
Logpoint names Mikkel Drucker as new CEO to drive growt...
Thu, 30th May 2024
![Story image](../../../../../uploads/story/2024/05/16/preview_img-srwNQNzCOEztc2giHJzOP3o1.webp)
Gartner on SIEM
Splunk celebrates 10 years as Leader in Gartner Magic Q...
Thu, 16th May 2024
![Story image](../../../../../uploads/story/2024/02/07/preview_img-i4BM6EUODlx8xvd7w1f34qdH.webp)
Miercom on Ransomware
Check Point Infinity platform excels in Miercom's secur...
Wed, 7th Feb 2024
Expert columns
![Story image](../../../../../uploads/story/2024/07/17/preview_techday_4f23cf4e55966ec6ba25.webp)
By Raj Samani of Rapid7
Defending against APTs: A learning exercise with Kimsuk...
Last week
![Story image](../../../../../uploads/story/2024/07/01/preview_Mina_Mousa.webp)
By Mina Mousa of Extreme Networks
Adapting cybersecurity strategies to the escalating thr...
This month
![Story image](../../../../../uploads/story/2024/06/28/preview_Trevor_Dearing.webp)
By Trevor Dearing of Illumio
Why the answer to AI threats is not more AI
Last month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f4ab0d15ef268854d321.webp)
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
![Story image](../../../../../uploads/story/2024/06/17/preview_techday_c726e5336a017d6a715f.webp)
By Audra Simons of Everfox
Fighting back against the growing threat of ransomware
Last month
More expert columns
![Story image](../../../../../uploads/story/2024/06/06/preview_techday_c79ed9988a8da67dbb08.webp)
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Last month
![Story image](../../../../../uploads/story/2024/06/03/preview_img-vOiVlQs2wmxpOdir3gSwGURs.webp)
By Gigamon
Network visibility: How to improve it and why it will i...
Last month
![Story image](../../../../../uploads/story/2024/05/06/preview_Anthony_Daniel_.webp)
By Anthony Daniel of WatchGuard Technologies
How the evolution of AI will reshape cybersecurity
Mon, 6th May 2024
![Story image](../../../../../uploads/story/2024/05/03/preview_31(2).webp)
By Simon Howe of ExtraHop
There is no zero trust without network visibility
Fri, 3rd May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-7eyWPfRIYcR4ZC7PEgtKJcnm.webp)
By Mark Gorrie of Gen Digital Inc
What is vishing? Tips to spot and avoid voice phishing ...
Thu, 2nd May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-HxlMgvs503iLLYQpm6B2e2yW.webp)
By Jonathan Tanner of Barracuda Networks
The remote desktop tools most targeted by attackers in ...
Thu, 2nd May 2024
Top players
You can read more from the top players Check Point Software, Apple, Trend Micro, Kaspersky, and Symantec.
Recent news
![Story image](../../../../../uploads/story/2024/07/24/preview_techday_6ebab51d787be4d0281e.webp)
About Network visibility
Dragos uncovers new malware FrostyGoop targeting ICS sy...
4 days ago
![Story image](../../../../../uploads/story/2024/07/19/preview_techday_70d0d7d5c5bca2a2bf6b.webp)
About Bring Your Own Device
Fortinet reveals rising cyber threats targeting Paris 2...
Last week
![Story image](../../../../../uploads/story/2024/07/08/preview_techday_9a65a485a1469986b54b.webp)
About Security vulnerabilities
Endor Labs warns of critical vulnerabilities in CocoaPo...
This month
![Story image](../../../../../uploads/story/2024/07/04/preview_Zyxel.webp)
About Sustainability
Zyxel Networks unveils new WiFi 6 security router for S...
This month
![Story image](../../../../../uploads/story/2024/07/04/preview_techday_3fb6b434e49fd9ea168b.webp)
About Threat intelligence
NCSC's Malware Free Network disrupts 10 million cyber t...
This month
More news
![Story image](../../../../../uploads/story/2024/07/02/preview_techday_eeb5774741b84872ca9b.webp)
About Ransomware
ANZ employees most likely to fall for phishing, report ...
This month
![Story image](../../../../../uploads/story/2024/06/28/preview_techday_2de3e7d80da07eaa9046.webp)
About Software Updates
Bitdefender & Netgear report reveals major IoT vulnerab...
Last month
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_7434cebf4ac47077c860.webp)
About Smartphones
BlackBerry cyber report reveals 3.1 million attacks in ...
Last month
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_178c2f0ed081cf164059.webp)
About Smartphones
BlackBerry thwarts 3.1 million cyberattacks in early 20...
Last month
![Story image](../../../../../uploads/story/2024/06/25/preview_techday_78cccfbb3820a536c541.webp)
About Development
Elastic discovers new attack vector in Microsoft Manage...
Last month
Even more news
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_2011dc7d408436244d49.webp)
About Risk & Compliance
Foregenix spins off tech to new venture Turaco Labs
Last month
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_bcb8707c3b58228acf59.webp)
About Cloud Services
New report details evolution of P2Pinfect into ransomwa...
Last month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_f22a068094df723fedb8.webp)
About Cloud Services
Businesses to increase cloud use by 85% in next five ye...
Last month
![Story image](../../../../../uploads/story/2024/06/19/preview_techday_a2489a08cf4c8edfd52c.webp)
About Ransomware
Global survey reveals growing inadequacies in cyber thr...
Last month
![Story image](../../../../../uploads/story/2024/06/07/preview_img-6EqdEdqb3nd4754goBbw30DU.webp)
About Firewalls
Chinese espionage campaign targeting Southeast Asia rev...
Last month
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Advanced Persistent Threat Protection, Firewalls, and Ransomware.
Powered by