Back to glossary

Trojan Horse

A Trojan horse, also referred to as simply a Trojan, is a form of malware that presents itself as legitimate software but contains malicious code. Trojans are designed to stealthily infiltrate the victim’s computer and grant access to threat actors.

Unlike viruses, Trojans don’t replicate themselves, but they can be just as damaging. One of the most insidious types of Trojan is a backdoor, which allows attackers to remotely control the affected computer.

To defend against Trojan Horse attacks, organizations should use reliable and regularly updated antivirus software, educate employees to avoid downloading unknown or unsolicited programs, and maintain robust firewalls and security protocols.

Stay in the Know

Get VikingCloud Resources, News & Views delivered straight to your inbox.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Blogs

Stay up-to-date on the latest happenings in Cybersecurity and PCI Compliance.

Apr 13, 2026
Blog
Threat Detection and Response
Asgard Platform
Cybersecurity
Blog
Apr 13, 2026

MDR vs. MSSP: Which Security Approach Fits Your Business?

Learn More
Apr 6, 2026
Blog
Asgard Platform
Cybersecurity
Compliance
PCI Compliance
PCI DSS
Blog
Apr 6, 2026

The Fragmented PCI Problem: How Service Providers Are Overpaying Without Knowing It

Learn More
Apr 6, 2026
Blog
Cybersecurity
Data Security
Penetration Testing
Blog
Apr 6, 2026

Cyber Threat Unit: Howell King Jr.

Learn More