Malware is any software intentionally designed to cause harm to a computer, server, network, or user. Short for "malicious software," malware encompasses a broad category of threats including viruses, worms, trojans, ransomware, spyware, and adware, each with different infection methods, behaviors, and objectives ranging from data theft to system destruction.
Malware is the umbrella term for software designed to do things you don't want: steal your data, encrypt your files, spy on your activity, hijack your computing resources, or destroy your systems. It's one of the oldest categories of cybersecurity threats and remains one of the most prevalent.
The major types of malware include:
Modern malware rarely arrives through a single channel. Common delivery methods include:
A virus is a specific type of malware. Malware is the broad category that includes all malicious software: viruses, worms, trojans, ransomware, spyware, and more. A virus specifically refers to malware that attaches itself to legitimate programs or files and spreads when those infected files are shared or executed. The term "virus" is often used colloquially to mean any malware, but technically it's just one subcategory. In modern cybersecurity, ransomware, infostealers, and trojans are far more common threats to businesses than traditional file-infecting viruses.
Yes. While traditional malware targeted desktop operating systems, modern malware can compromise cloud workloads, containers, and serverless functions. Attackers deploy cryptominers on compromised cloud instances, install backdoors in container images, or inject malicious code into CI/CD pipelines. Cloud-specific malware often leverages stolen credentials or misconfigured services rather than exploiting software vulnerabilities directly. Protecting cloud infrastructure requires a combination of CSPM (for misconfiguration detection), strong IAM policies, container image scanning, and runtime monitoring.
Common indicators include unexpected system slowdowns or high CPU usage (possible cryptominer), unusual network traffic to unknown destinations (possible data exfiltration or command-and-control communication), unauthorized changes to files or configurations, unexpected cloud resource provisioning, new user accounts or elevated permissions you didn't create, and disabled security tools. EDR solutions automate much of this detection. For cloud environments, monitor CloudTrail or equivalent audit logs for unexpected API calls. Many infections are discovered only during incident response, which is why prevention and monitoring are both essential.