Skip to content
Defending Linux: Threat Hunting in the Cloud
Section 1: Linux in the Cloud: An attraction for everyone – including threat actors
Chapter 1: Navigating the Complexities of Cloud: A Comparison Between On-Premises and Cloud
Chapter 2: The Linux Reign in the Cloud
Chapter 3: Challenges with Linux in Cloud Environments
Section 2: Unveiling Cloud Threats: Linux Under Siege
Chapter 4: Linux as a Primary Target for Attackers Explore the Linux attack types
Chapter 5: Decoding HIVE Malware Linux’s Encounter with Advanced Threats
Section 3: Precision in Action: Leveraging Deep Threat Analysis for Linux and Cloud Security
Chapter 6: Integrating Deep Threat Analysis Fact-based security for Linux and Cloud
Chapter 7: In-depth analysis of a HIVE malware sample – Coming soon
Chapter 8: In-depth analysis of an XMRig sample – Coming soon
Previous Chapter
Next Chapter

Chapter 7: In-depth analysis of a HIVE malware sample – Coming soon

  1. Defending Linux: Threat Hunting in the Cloud
  2. Section 3: Precision in Action: Leveraging Deep Threat Analysis for Linux and Cloud Security
  3. Chapter 7: In-depth analysis of a HIVE malware sample – Coming soon
Previous Chapter
Back to Section
Next Chapter

ThreatFeed

Linkedin-in Youtube Facebook-f
  • Solutions

    products

    • UniqueSignal (NEW!)
    • DeepResponse
    • FinalVerdict
    • TotalInsight
    • Analyzer (Legacy)
    • Professional Services

    use cases

    • Alert Investigation for SOAR
    • Alert Enrichment for EDR
    • Incident Response
    • Threat Hunting
    • Threat Intel Extraction
    • Detection Engineering
    • User Reported Phishing

    Find yours

    • For Public Sector
    • For MSSP/MDR
    • For Banking
    • For Channel Partner
  • Why VMRay

    Why VMRay

    • VMRay Unparalleled
    • Technology
    • Leadership
    • Milestone
    • Privacy

    Customer Success Stories 

    • Expel
    • Global Tech
    • Northwestern Mutual
    • European Intra-Gov
    • World's Leading Insurance Company
    • Leading Automotive Manufacturer
    • Healthcare Giant
    • More Customer Stories 
  • Integrations

    By CAtegory

    • SecOps Automation (SOAR)
    • Endpoint Detection & Responce (EDR)
    • Security Information & Event Mgmt (SIEM)
    • Threat Intelligence (TIP)

    Featured Integration

    • SentinelOne
    • CrowdStrike
    • Cortex XSOAR
    • Microsoft Defender
    • More Integrations
  • Resources

    Insights

    • Blog
    • Malware Reports
    • Academy
    • Webinars
    • White Papers
    • Solution Briefs
    • Industry Reports

    Malware Analysis Reports

    • Lokibot
    • BumbleBee
    • Pikabot Windows
    • Many More

    cybersecurity glossary

    • Malware Sandbox
    • Emotet
    • Qbot
    • Many More...
    Latest Malware Analysis Spotlight
    Latrodectus: A year in the making

    ✓ Latrodectus quickly filled IcedID’s void, rising as a major cyber threat;

    ✓ Uses advanced evasion—process checks, MAC validation, anti-debugging;

    ✓ Rapid updates refine tactics, constantly outpacing security defenses!

    Learn More
  • Company

    NEWS

    • VMRay Product Portfolio
    • New Partnership
    • Investor Relations
    • VMRay Events
    • More

    ABOUT US & CONTACT

    • Leadership
    • Milestone
    • Contact Us
    • Customer Support
    • Channel Partners
    • Global Presence

    CAREERs

    • Culture & Values
    • Life at VMRay
    • Teams
    • Jobs
VMRay Pricing
Try VMRay

🚀 Meet UniqueSignal: the actionable malware intelligence VMRay powers. 60 Days FREE TRIAL - Available For A LIMITED TIME.

Start Free Trial