The Ultimate Guide to Malware
2022 edition
Overview
This broad term encompasses all types of software intended to disrupt, compromise, attack or otherwise interfere with the normal operation of computing devices and services. There are many examples of malware (malicious software), from keyloggers and other spyware, to backdoors, viruses, worms, adware and ransomware. Malware developers are generally known as ‘hackers’ and can act in coordinated groups, or as ‘lone sharks’. Most malware is developed with a specific goal in mind, and that goal is usually the extraction of money from targeted organisations or computer users.
Analyst reports

KuppingerCole on Ransomware
Absolute recognised in KuppingerCole Leadership Compass...
Thu, 22nd Sep 2022

Gartner on Firewall
Fortinet attributes Gartner-reported growth to ZTNA app...
Wed, 17th Aug 2022

Forrester Research on Ransomware
Manufacturing industry hard hit by ransomware, Akamai f...
Thu, 28th Jul 2022

Gartner on CASB
Ivanti and Lookout bring zero trust security to hybrid ...
Mon, 16th May 2022

Gartner on SaaS
Absolute Software expands Secure Access product offerin...
Fri, 13th May 2022
Expert columns

By Mark Gorrie of Gen Digital
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022

By John Donovan of Sophos
Cyber insurance. A changing of the guard.
Thu, 15th Sep 2022

By Carolina Valencia of Aqua Security
How to protect against the growing fileless malware thr...
Wed, 31st Aug 2022

By Dave Russell of Veeam Enterprise
Breaking the myths of Zero Trust model and understandin...
Wed, 31st Aug 2022

By Diego Betancur of Nozomi Networks
Zero Trust, but verify - finding the OT in ZerO Trust
Fri, 12th Aug 2022
Interviews

Discussing Bitdefender
Exclusive: Bitdefender on ensuring cyber safety in toda...
Tue, 30th Aug 2022

Discussing Artificial Intelligence
Exclusive: NZ-based DEFEND offers global cyber protecti...
Tue, 9th Aug 2022

Discussing Work from Home
Can SMEs run a hybrid work model securely in Aotearoa?
Tue, 31st May 2022
More expert columns

By Stephen Kho of Avast
Big business in cryptocurrencies and cybercrime
Wed, 10th Aug 2022

By Corne Mare and Glenn Maiden of Fortinet
Cyber threats impacting Australian and New Zealand busi...
Thu, 28th Jul 2022

By Caitlin Condon of Rapid7
Zero-day attacks climb as hackers get more sophisticate...
Mon, 18th Jul 2022

By Oliver Tavakoli of Vectra
Examining the future of ransomware threats with Vectra’...
Wed, 6th Jul 2022

By Michael Montoya of Equinix
Cybersecurity priorities for digital leaders navigating...
Wed, 22nd Jun 2022

By Scott Leach of Varonis
What we can learn from the leaked Conti ransomware grou...
Tue, 7th Jun 2022
Top players
Recent news

About Ransomware
China-based threat group targeting public cloud - Radwa...
This month

About Nozomi Networks
Hacktivists used more destructive malware in 2022 - rep...
This month

About Cloud Security
Malware-delivering cloud apps nearly tripled in 2022
This month

About Kaspersky
Kaspersky researchers reveal worrying development of AP...
This month

About Microsoft
Sophos discovers malicious code disabling security soft...
Last month
More news

About Java
Zimperium teams discover new malware in Flutter develop...
Last month

About Security vulnerabilities
China-based threat group targeting SE Asia, says Mandia...
Last month

About HP
Archive file formats discovered as most common way to d...
Last month

About Data breach
Secureworks CTU identifies increase in stolen credentia...
Last month

About Sophos
Sophos report reveals stark reality of cybercrime-as-a-...
Wed, 23rd Nov 2022
Even more news

About Nozomi Networks
Nozomi to host a cyber war game challenge in Australia
Fri, 18th Nov 2022

About Spam
Check Point reveals malware impacting 7% of all organis...
Wed, 16th Nov 2022

About Android
Kaspersky researchers uncover previously unknown cyber ...
Thu, 10th Nov 2022

About FortiGuard
FortiGuard predicts rise in advanced threat methods
Tue, 8th Nov 2022

About HP
HP launches Sure Access Enterprise to protect data and ...
Wed, 2nd Nov 2022
Other guides
You can read other related guides from Cybersecurity, Technology Gifts, Breach Prevention, Network Management, and Network Security.
Powered by