Researchers have detailed how Docker containers are becoming a prime target for cryptojackers at a time when fraudulent cryptocurrency mining is a lucrative business. Cybercriminals are turning away ...
Exposed Docker APIs continue to be used by attackers to create new containers that perform cryptojacking. Earlier this year we reported on attackers utilizing insecure Docker and Kubernetes systems to ...
Your Docker setup is probably sharing root access with your host machine, and that's far from ideal for a self-hosting server ...
Trivy supply chain attack pushed malicious Docker images on March 22, enabling credential theft and worm spread, impacting ...