Defending Linux: Threat Hunting in the Cloud
Section 1: Linux in the Cloud: An attraction for everyone – including threat actors
3 Chapters
Chapter 1: Navigating the Complexities of Cloud: A Comparison Between On-Premises and Cloud
Chapter 2: The Linux Reign in the Cloud
Chapter 3: Challenges with Linux in Cloud Environments
Section 2: Unveiling Cloud Threats: Linux Under Siege
2 Chapters
Chapter 4: Linux as a Primary Target for Attackers Explore the Linux attack types
Chapter 5: Decoding HIVE Malware Linux’s Encounter with Advanced Threats
Section 3: Precision in Action: Leveraging Deep Threat Analysis for Linux and Cloud Security
3 Chapters
Chapter 6: Integrating Deep Threat Analysis Fact-based security for Linux and Cloud
Chapter 7: In-depth analysis of a HIVE malware sample – Coming soon
Chapter 8: In-depth analysis of an XMRig sample – Coming soon
Previous Chapter
Chapter 8: In-depth analysis of an XMRig sample – Coming soon
Defending Linux: Threat Hunting in the Cloud
Section 3: Precision in Action: Leveraging Deep Threat Analysis for Linux and Cloud Security
Chapter 8: In-depth analysis of an XMRig sample – Coming soon
Previous Chapter
Back to Section
Search
Search
ThreatFeed
Linkedin-in
Youtube
Facebook-f
Solutions
Close Solutions
Open Solutions
products
DeepResponse
FinalVerdict
TotalInsight
Analyzer (Legacy)
Professional Services
use cases
Alert Investigation for SOAR
Alert Enrichment for EDR
Incident Response
Threat Hunting
Threat Intel Extraction
Detection Engineering
User Reported Phishing
Find yours
For Public Sector
For MSSP/MDR
For Banking
For Channel Partner
Why VMRay
Close Why VMRay
Open Why VMRay
Why VMRay
VMRay Unparalleled
Technology
Leadership
Milestone
Privacy
Customer Success Stories
Expel
Global Tech
European Intra-Gov
World's Leading Insurance Company
Leading Automotive Manufacturer
More Customer Stories
Integrations
Close Integrations
Open Integrations
By CAtegory
SecOps Automation (SOAR)
Endpoint Detection & Responce (EDR)
Security Information & Event Mgmt (SIEM)
Threat Intelligence (TIP)
Featured Integration
SentinelOne
CrowdStrike
Carbon Black
Microsoft Defender
More Integrations
Resources
Close Resources
Open Resources
Insights
Blog
Malware Reports
Academy
Webinars
White Papers
Solution Briefs
Industry Reports
Malware Analysis Reports
Lokibot
BumbleBee
Pikabot Windows
Many More
cybersecurity glossary
Malware Sandbox
Emotet
Qbot
Many More...
Latest Malware Analysis Spotlight
Just Carry A Ladder: Why Your EDR Let Pikabot Jump Through
✓ Pikabot’s loader uses SysWhispers2 for indirect syscalls;
✓ The main SysWhispers2 function is less obfuscated than Pikabot’s sub-functions;
✓ QBot’s loader has been abusing this technique for over a year!
Learn More
Company
Close Company
Open Company
NEWS
VMRay Product Portfolio
New Partnership
Investor Relations
More
ABOUT US & CONTACT
Leadership
Milestone
Contact Us
Customer Support
Channel Partners
Global Presence
CAREERs
Culture & Values
Life at VMRay
Teams
Jobs
VMRay Pricing
Try VMRay