The Ultimate Guide to Malware
2023 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

FMI on DDoS
8.4% CAGR for DNS security market between 2023 and 2033...
Tue, 21st Mar 2023

FMI on Smartphones
Botnet detection market to be US$11 billion by 2032: FM...
Wed, 1st Mar 2023

KuppingerCole on Ransomware
Absolute recognised in KuppingerCole Leadership Compass...
Thu, 22nd Sep 2022

Gartner on Firewall
Fortinet attributes Gartner-reported growth to ZTNA app...
Wed, 17th Aug 2022

Forrester Research on Ransomware
Manufacturing industry hard hit by ransomware, Akamai f...
Thu, 28th Jul 2022
Expert columns

By Jonathan Tomek of Digital Element
The perils of proxies: the backdoor into your data
Fri, 10th Mar 2023

By Usman Choudhary of VIPRE
Taking a Multi-Faceted Approach to Ransomware Protectio...
Wed, 15th Feb 2023

By Mark Gorrie of Gen Digital
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022

By John Donovan of Sophos
Cyber insurance. A changing of the guard.
Thu, 15th Sep 2022

By Carolina Valencia of Aqua Security
How to protect against the growing fileless malware thr...
Wed, 31st Aug 2022
More expert columns

By Dave Russell of Veeam Enterprise
Breaking the myths of Zero Trust model and understandin...
Wed, 31st Aug 2022

By Diego Betancur of Nozomi Networks
Zero Trust, but verify - finding the OT in ZerO Trust
Fri, 12th Aug 2022

By Stephen Kho of Avast
Big business in cryptocurrencies and cybercrime
Wed, 10th Aug 2022

By Corne Mare and Glenn Maiden of Fortinet
Cyber threats impacting Australian and New Zealand busi...
Thu, 28th Jul 2022

By Caitlin Condon of Rapid7
Zero-day attacks climb as hackers get more sophisticate...
Mon, 18th Jul 2022

By Oliver Tavakoli of Vectra
Examining the future of ransomware threats with Vectra’...
Wed, 6th Jul 2022
Top players
Recent news

About Research
ESET researchers expose legitimate Android app as malwa...
Yesterday

About Cryptomalware
AceCrypto crimeware hits computers 10,000 times a month
3 days ago

About Government
LOTL cyber attack technique growing in popularity
Last week

About Data
Secureworks reveals 'thriving' infostealer market enabl...
Last month

About Security vulnerabilities
Check Point reveals top malware and vulnerabilities in ...
Last month
More news

About Zero day malware
Aqua launches pipeline integrity scanning to detect mal...
Last month

About Barracuda
Malicious HTML attachments a popular cyber threat: Barr...
Last month

About Network Security
Attackers find new ways to evade detection - Netskope r...
Last month

About Kaspersky
Kaspersky shares latest details about malicious APT thr...
Thu, 27th Apr 2023

About Infoblox
Infoblox: ANZ NetOps and SecOps teams need to work toge...
Mon, 24th Apr 2023
Even more news

About Cybersecurity
Businesses must remain diligent and enhance cybersecuri...
Thu, 20th Apr 2023

About Kaspersky
Cryptocurrency-related phishing attacks up by 40% - rep...
Thu, 13th Apr 2023

About Microsoft
New Emotet malware campaign bypasses Microsoft blocks
Thu, 13th Apr 2023

About Proofpoint
Proofpoint opens Australia data centres for data protec...
Thu, 6th Apr 2023

About Kaspersky
New clipper malware steals cryptocurrencies via fake To...
Thu, 6th Apr 2023
Other guides
You can read other related guides from Cybersecurity, Technology Gifts, Breach Prevention, Network Security, and Network Management.
Powered by