The Ultimate Guide to Malware
2025 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

AV-TEST on Ransomware
Kaspersky wins nine AV-TEST awards for cybersecurity ex...
Last month

Gartner on SaaS
Palo Alto Networks invests in Asia-Pacific cloud securi...
Fri, 28th Mar 2025

Gartner on MFA
AI to halve time needed for account takeover by 2027
Wed, 19th Mar 2025

Frost & Sullivan on Gaming
Group-IB's fraud solution now accessible via AWS Market...
Tue, 11th Mar 2025

Miercom on Endpoint Protection
Check Point's Infinity Platform excels in new security ...
Fri, 7th Feb 2025
Expert columns

By Chris Boyd of Rapid7
2025 Ransomware: Business as Usual, Business is Booming
Last month

By Dakshitaa Babu of SquareX
Why ClickFix attacks are outpacing enterprise security
Fri, 21st Mar 2025

By Bob Gilbert of Netskope
Bad AI, good AI: harnessing AI for a stronger security ...
Mon, 3rd Mar 2025

By Martin Zugec of Bitdefender
Cybersecurity predictions 2025: Hype vs. reality
Fri, 17th Jan 2025

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025
More expert columns

By Alistair Miller of Aura Information Security
New year, new protections: Top tips to safeguard your b...
Thu, 19th Dec 2024

By Jake King of Elastic Security
Elastic Security's top three cybersecurity predictions ...
Tue, 17th Dec 2024

By Sneha Banerjee of ManageEngine
Sneaky scams to watch for this holiday season (and how ...
Fri, 13th Dec 2024

By Sadiq Iqbal of Check Point Software Technologies
From deepfakes to ransomware: The key trends which will...
Mon, 9th Dec 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Dakshitaa Babu of SquareX
Attackers break malware into tiny pieces and bypass you...
Fri, 20th Sep 2024
Top players
You can read more from the top players Extend, Kaspersky, Check Point Software, Volution, and Apple.
Recent news

About Data Protection
Low-tech phishing scams on the rise as criminals shift ...
Yesterday

About Bring Your Own Device
Palo Alto Networks unveils Prisma SASE browser for AI s...
Yesterday

About Ransomware
Iberian blackout raises fears of growing cyber-attack r...
Yesterday

About Software Updates
Offline malware attacks surge in Southeast Asia, hittin...
2 days ago

About Virtual Private Networks
Australian investors lose AUD $945 million to cyber sca...
2 days ago
More news

About Ransomware
APAC CIOs face cyber threats despite rising security sp...
2 days ago

About Enterprise security
Censys launches module to boost proactive threat huntin...
2 days ago

About Spam
Cybercriminal groups use RDGAs in scams, phishings
3 days ago

About Virtualisation
Veeam report finds 69% of firms hit by ransomware in pa...
Last week

About Spam
Hornetsecurity partners with Amazon to enhance SES Mail...
Last week
Even more news

About Small Business
System intrusions cause 80% of Asia-Pacific data breach...
Last week

About Firewalls
OPSWAT partners with Sektor Cyber to boost ANZ presence
Last week

About Digital Literacy
Quishing attacks rise as QR codes pose new cybersecurit...
Last week

About Ransomware
Nine in ten IT leaders faced cyberattacks as threats in...
Last week

About Software-as-a-Service
Expel expands MDR platform to boost email threat detect...
Last week
Other guides
You can read other related guides from Cybersecurity, Advanced Persistent Threat Protection, Email Security, Ransomware, and Breach Prevention.
Powered by