The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports
IDC MarketScape on Firewalls
Sophos MDR services protect 26,000 organisations global...
Last week
Gartner on Ransomware
Check Point Software named Visionary in 2024 Gartner re...
Fri, 27th Sep 2024
Forrester Wave on Ransomware
ColorTokens named leader in Forrester Wave for microseg...
Thu, 29th Aug 2024
IDC on Endpoint Protection
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Gartner Peer Insights on Ransomware
SentinelOne earns top ratings in Gartner review for sec...
Wed, 3rd Jul 2024
Expert columns
By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Last week
By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
This month
By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Last month
By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Last month
By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Last month
More expert columns
By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Last month
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024
By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024
By Dakshitaa Babu of SquareX
Hiding in plain sight – How attackers conceal malware i...
Fri, 13th Sep 2024
By Dakshitaa Babu of SquareX
Unmonitored channels – Express malware delivery bypassi...
Thu, 5th Sep 2024
By Raj Sivaraju of Arete
Ransomware trends: A threat to insurance business conti...
Tue, 13th Aug 2024
Top players
You can read more from the top players Check Point Software, Volution, Kaspersky, Apple, and Trend Micro.
Recent news
About Sustainability
EY report highlights AI trends & challenges for 2025
Yesterday
About Ransomware
GuidePoint warns of Python backdoor used in ransomware
Yesterday
About Scams
Scammers exploit LA wildfires with QR code phishing
Last week
About Endpoint Protection
Cybercriminals exploiting AI to enhance attack methods
Last week
About Data Protection
UK SMEs focus on AI threats over traditional cyber risk...
Last week
More news
About Data sharing
Infoblox uncovers cyber threats exploiting domain spoof...
Last week
About Ransomware
AI threats top concern for UK SMEs' cybersecurity in 20...
Last week
About Firewalls
Cyber threats rising in manufacturing sector, study war...
Last week
About Ransomware
UK manufacturing faces surge in AI-driven cyber threats
Last week
About Information Communication & Technology
Mandiant reveals details of major Ivanti VPN vulnerabil...
This month
Even more news
About Cloud Services
AI-driven phishing & malware threats to rise by 2025
This month
About Contactless payments
Kaspersky warns of increasing threats from tampered NFC...
Last month
About Identity Theft
New malware CookiePlus targets nuclear sector workers
Last month
About Ransomware
Kaspersky reports 135% rise in crypto-drainer discussio...
Last month
About Cloud Services
Phishing campaign targets YouTube creators with fake de...
Last month
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Breach Prevention, Email Security, and Ransomware.
Powered by