diff --git a/cysec.html b/cysec.html
index ea9add4..e2bbfd7 100644
--- a/cysec.html
+++ b/cysec.html
@@ -373,6 +373,7 @@
Malware Attacks :
Viruses : A virus is a piece of malicious software or code that attaches itself to a program or file. It is designed to spread from one computer to another when the infected files are shared or opened, and it works by altering, overwriting, or deleting files once it infects a system. A virus often disrupts system operations.
Worms : Standalone programs that replicate themselves and spread across networks without requiring a host file. Unlike viruses, they can spread automatically without user intervention by exploiting vulnerabilities in networks.
Trojans : Malicious software disguised as legitimate programs to trick users into running it, often used to steal data or gain unauthorized access.
+ Backdoor : A type of malicious software or access point that enables attackers to bypass normal authentication methods and gain unauthorized remote access to a system. Often disguised as legitimate software, backdoors are typically installed by Trojans and provide attackers with persistent control over the compromised system.
Ransomware : Software that encrypts a victim’s data and demands a ransom payment in exchange for the decryption key.
Spyware : Software that secretly monitors and collects information about users and users's devices without their knowledge.
Adware : Software that automatically displays or downloads unwanted advertisements and often tracks user behavior.