Security researchers have identified a new cyber-threat targeting publicly exposed instances of the Docker Engine API. In this campaign, attackers exploit misconfigurations to deploy a malicious ...
A new attack campaign deploys malicious container images on cloud servers by exploiting insecure Docker Engine API endpoints. The malicious image contains a distributed denial-of-service (DDoS) botnet ...
The WatchDog hacking group is conducting a new cryptojacking campaign with advanced techniques for intrusion, worm-like propagation, and evasion of security software. The hacking group targets exposed ...
Missing authentication on the Docker Engine management API for Docker Desktop on Windows and Mac allows attackers to break out from containers and potentially execute malicious code on the underlying ...
Exposed Docker APIs continue to be used by attackers to create new containers that perform cryptojacking. Earlier this year we reported on attackers utilizing insecure Docker and Kubernetes systems to ...
In the container software Docker Desktop, attackers can access the Docker engine and subsequently the file system of the host system from malicious containers. Updated software is available to close ...
Palo Alto Networks’ Unit 42 threat intelligence group has pinpointed a new cryptojacking worm that has infected more than 2,000 unsecured Docker hosts and is being used to mine Monero cryptocurrency.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results