The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

Gartner on Firewalls
Why is ransomware still a thing in 2025?
Last month

AV-TEST on Ransomware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Mon, 14th Apr 2025

Gartner on SaaS
Palo Alto Networks invests in Asia-Pacific cloud securi...
Fri, 28th Mar 2025

Gartner on MFA
AI to halve time needed for account takeover by 2027
Wed, 19th Mar 2025

Frost & Sullivan on Gaming
Group-IB's fraud solution now accessible via AWS Market...
Tue, 11th Mar 2025
Expert columns

By Rakesh Prabhakar of Zoho Australia and New Zealand
Is it time to re-think the business browser?
Last week

By Erich Kron of KnowBe4
Malicious memes: How cybercriminals use humour to sprea...
Last month

By Gareth Cox of Exabeam
How businesses are fighting sophisticated cyber threats...
Last month

By Robert Vinokurov of Dell Technologies
It’s the end of passwords as we know it
Last month

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Thu, 17th Apr 2025
More expert columns

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Fri, 21st Mar 2025

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Mon, 3rd Mar 2025

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Thu, 19th Dec 2024

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024
Top players
You can read more from the top players Extend, Kaspersky, Check Point Software, Volution, and Apple.
Recent news

About Marketing Technologies
Fake CAPTCHA scam targets 2,353 WordPress sites, warns ...
Yesterday

About Software-as-a-Service
Russian Market remains key player in cyber credential t...
Yesterday

About Phishing
AI-fuelled scams & phishing soar in New Zealand, says G...
Last week

About Antivirus
Fake AI social media ads spread malware to millions glo...
Last week

About Cyber Criminal
US charges Russian in Qakbot cybercrime, seizes USD $24...
Last week
More news

About Software-as-a-Service
Immersive unveils new OT cybersecurity training for ind...
Last month

About Data Protection
Organisations boost AI security as data threats & risks...
Last month

About Cyber Criminal
Ransomware attacks down 31% but retail sector hit hard
Last month

About Software Updates
Cloudflare, Microsoft & police disrupt global malware s...
Last month

About Ransomware
Organisations prioritise AI security as GenAI adoption ...
Last month
Even more news

About Australian Government
Australia faces mounting cyber threats to vital infrast...
Last month

About Firewalls
AI-driven phishing attacks outpace legacy email securit...
Last month

About Gaming
Aussie families face internet lags as homes juggle 20 d...
Last month

About Cyber espionage
North Korean hackers step up phishing attacks on Ukrain...
Last month

About Online fraud
Facebook ads scam uses celebrity faces to spread malwar...
Last month
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Email Security, Ransomware, and Phishing.
Powered by