Threat IntelligenceAlso called: "malicious software", "malicious code"
Malware is an umbrella term for any software intentionally designed to cause harm, steal data, or compromise system integrity.
Common malware types
- Ransomware: Encrypts data and demands payment for decryption keys.
- Trojans: Disguise as legitimate software to trick users into installation.
- Spyware: Secretly monitors user activity and steals sensitive information.
- Worms: Self-replicating programs that spread across networks without user action.
- Rootkits: Hide deep in the operating system to evade detection.
- Adware: Displays unwanted advertisements and tracks browsing behavior.
Infection vectors
- Phishing emails with malicious attachments or links.
- Drive-by downloads from compromised websites.
- Infected USB drives and removable media.
- Exploiting unpatched software vulnerabilities.
- Social engineering and fraudulent software installers.
How to defend against malware
- Deploy endpoint protection with behavioral detection (EDR/XDR).
- Keep all software and operating systems patched and updated.
- Implement email security with attachment scanning and sandboxing.
- Use application allowlisting for critical systems.
- Train employees to recognize phishing and suspicious downloads.
- Maintain offline, immutable backups for ransomware recovery.
- Segment networks to contain malware spread.
Explore More Threat Intelligence
View all termsIP Reputation
A trustworthiness score assigned to IP addresses based on observed behavior, used to identify malicious traffic.
Read more →Phishing
A social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information or installing malware.
Read more →Threat Intelligence
Evidence-based knowledge about existing or emerging threats used to inform security decisions and response.
Read more →URL/Domain Defanging
A technique to render URLs and IPs non-clickable by replacing characters, preventing accidental access to malicious sites.
Read more →