News

The new variant of Docker-targeting malware skips cryptomining in favor of persistence, backdoors, and even blocking rivals ...
Improperly secured privileged containers on the Play with Docker testing platform offered security researchers a way to escape Linux containers and run arbitrary code on the host system. An attacker ...
The attack chain essentially involves breaking into misconfigured Docker APIs to execute a new container based on the Alpine ...
Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet.
A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could ...