TM
TechMonitor_Logo

Sections

  • Home
  • Sectors
    • Cybersecurity
    • Digital economy
      • AI and automation
      • Big Tech
    • Government Computing
    • Hardware
      • Silicon
      • Cloud
      • Data Centres
      • Networks
      • Quantum
    • Leadership
      • Digital Transformation
      • Innovation
      • Sustainability
  • White Papers
    • Companies A-Z
    • White Papers
    • Company Releases
  • Events
  • Newsletters
  • About us
    • Contact us
  • From Our Partners
    • Building the Foundations of Industry 5.0
Menu
Search
  • Sectors

    Sections

    • Cybersecurity
    • Digital economy
    • Government Computing
    • Hardware
    • Leadership

    Latest

    • Cloudera chief AI architect on building human-first AI
    • Quantum computing is reshaping secure communications. Metadata is now the first line of defence
    • Slack has landed a starring role at Salesforce
  • White Papers

    Sections

    • Companies A-Z
    • White Papers
    • Company Releases

    Latest

    • 2025 Industrial digitalization report
    • IDC MarketScape: Worldwide Client Endpoint Management Software for Windows Device Management 2025–2026
    • Gartner Magic Quadrant for Endpoint Management Tools 2026
  • Events
  • Newsletters
  • Companies
Left
Right

2022 VMware Technical Threat Report

By VMware

90% of cloud runs on Linux. So, is it any wonder that malware is propagating in multi-cloud environments under the radar? Current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. Based on research conducted by the VMware Threat Analysis Unit, this report uncovers the unique characteristics of remote access tools (RATs), ransomware, and cryptominers on Linux-based systems and how you can mitigate these threats. You will learn more about: Existing characterization techniques and how to protect against more sophisticated malware. Ransomware and cryptominer families that target Linux-based systems following their evolution and cross-pollination how to fight back against the ransomware problem with a combination of approaches, policies, and mechanisms.

Thank you. Please check your email to download the whitepaper.

Tech Monitor

  • About us
  • Advertising with us
  • Contact us
  • Newsletters
  • Privacy Policy
  • Terms & Conditions
  • Sitemap

Powered by PMI

© GlobalData Plc 2026

  • Lost Password Back ⟶
  • Login
  • Register
Lost Password?
Registration is disabled.