# [Security intelligence](index.md) ## [Understand malware & other threats](understanding-malware.md) ### [Prevent malware infection](prevent-malware-infection.md) ### [Malware names](malware-naming.md) ### [Coin miners](coinminer-malware.md) ### [Exploits and exploit kits](exploits-malware.md) ### [Fileless threats](fileless-threats.md) ### [Macro malware](macro-malware.md) ### [Phishing](phishing.md) ### [Ransomware](ransomware-malware.md) ### [Rootkits](rootkits-malware.md) ### [Supply chain attacks](supply-chain-malware.md) ### [Tech support scams](support-scams.md) ### [Trojans](trojans-malware.md) ### [Unwanted software](unwanted-software.md) ### [Worms](worms-malware.md) ## [How Microsoft identifies malware and PUA](criteria.md) ## [Submit files for analysis](submission-guide.md) ## [Safety Scanner download](safety-scanner-download.md) ## [Industry tests](top-scoring-industry-antivirus-tests.md) ## [Industry collaboration programs](cybersecurity-industry-partners.md) ### [Virus information alliance](virus-information-alliance-criteria.md) ### [Microsoft virus initiative](virus-initiative-criteria.md) ### [Coordinated malware eradication](coordinated-malware-eradication.md) ## [Information for developers](developer-info.md) ### [Software developer FAQ](developer-faq.md) ### [Software developer resources](developer-resources.md)