Overview
Direct Answer
Malware is malicious software engineered to infiltrate, disrupt, or compromise computer systems and networks without authorisation. It encompasses diverse attack vectors including viruses, trojans, ransomware, and spyware, each with distinct propagation and payload mechanisms.
How It Works
Malicious code executes within a target system's environment, typically exploiting vulnerabilities in operating systems, applications, or user behaviour. Once installed, the software may establish persistence through rootkit techniques, communicate with command-and-control servers, or immediately deliver destructive payloads such as data encryption, exfiltration, or system degradation.
Why It Matters
Organisations face substantial financial, operational, and reputational damage from successful compromises, including downtime costs, data breach liability, and regulatory penalties. Detection and remediation require continuous investment in endpoint protection, threat intelligence, and incident response capabilities, making malware defence a critical operational priority.
Common Applications
Financial institutions combat banking trojans targeting credentials; healthcare organisations defend against ransomware threatening patient data availability; manufacturing sectors address industrial control system compromises. Supply chain attacks distribute malicious payloads through legitimate software distribution channels, affecting multiple downstream organisations simultaneously.
Key Considerations
Advanced variants employ polymorphic code, anti-analysis techniques, and zero-day vulnerabilities to evade detection systems. Prevention remains incomplete; organisations must balance detection, containment, and recovery strategies within resource constraints.
More in Cybersecurity
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Threat Modelling
Security GovernanceA structured approach for identifying, quantifying, and addressing security threats to a system or application.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Security Orchestration Automation and Response
Defensive SecurityTechnology that automates security operations by orchestrating tools and processes for incident response.
Secure Access Service Edge
Network SecurityA cloud architecture that converges networking and security services including SD-WAN, firewall, and zero trust access into a unified cloud-delivered platform.
Privileged Access Management
Identity & AccessSecurity solutions that control and monitor access for users with elevated permissions to critical systems.
Data Loss Prevention
Data ProtectionTechnology and processes that prevent sensitive data from being lost, misused, or accessed by unauthorised users.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.