TM
TechMonitor_Logo

Sections

  • Home
  • Sectors
    • Cybersecurity
    • Digital economy
      • AI and automation
      • Big Tech
    • Government Computing
    • Hardware
      • Silicon
      • Cloud
      • Data Centres
      • Networks
      • Quantum
    • Leadership
      • Digital Transformation
      • Innovation
      • Sustainability
  • White Papers
    • Companies A-Z
    • White Papers
    • Company Releases
  • Events
  • Newsletters
  • About us
    • Contact us
Menu
Search
  • Sectors

    Sections

    • Cybersecurity
    • Digital economy
    • Government Computing
    • Hardware
    • Leadership

    Latest

    • TUI staff were drowning in HR processes. Here’s how they resurfaced.
    • Has the UK’s Cyber Essentials scheme failed?
    • How can founders generate ROI while preserving the dignity of their software engineers? This Czech firm thinks it has the answer.
  • White Papers

    Sections

    • Companies A-Z
    • White Papers
    • Company Releases

    Latest

    • Tackling Water and Efficiency Challenges in Food & Beverage Plants
    • Industry: Take The Lead On Sustainability Through Water Reuse
    • Discover how a Colorado-based Brewery achieved significant efficiency gains and cost savings with intelligent pump solutions!
  • Events
  • Newsletters
  • Companies
Left
Right

2022 VMware Technical Threat Report

By VMware

90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. Based on research conducted by the VMware Threat Analysis Unit, this report uncovers the unique characteristics of remote access tools (RATs), ransomware, and cryptominers on Linux-based systems and how you can mitigate these threats. You will learn more about: Existing characterization techniques and how to protect against more sophisticated malware. Ransomware and cryptominer families that target Linux-based systems following their evolution and cross-pollination how to fight back against the ransomware problem with a combination of approaches, policies, and mechanisms.

Thank you. Please check your email to download the whitepaper.

Tech Monitor

  • About us
  • Advertising with us
  • Contact us
  • Newsletters
  • Privacy Policy
  • Terms & Conditions
  • Sitemap

Powered by PMI

© Globaldata plc 2025

  • Lost Password Back ⟶
  • Login
  • Register
Lost Password?
Registration is disabled.