Tag: Containers
-
TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters
This article details a new campaign by TeamTNT, a notorious hacking group, leveraging exposed Docker daemons to deploy malware, using …
-
Perfctl malware strikes again as crypto-crooks target Docker Remote API servers
An unknown attacker is abusing exposed Docker Remote API servers to deploy perfctl cryptomining malware on victims’ systems, according to …
-
Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according …
-
Socket secures $40M to strengthen open-source software security
Supply chain security startup Socket Inc. announced today that it has raised $40 million in new funding to fuel its mission to modernize …
-
Are Your Containers Secure? Answer These 5 Questions and Find Out
What Is Container Security? Container security involves protecting containerized environments and the applications they …
-
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet
Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the …
-
NVIDIA Container Toolkit Vulnerability Exposes AI Systems to Risk
The vulnerability, discovered by Wiz researchers, affects both cloud-based and on-premises AI applications using the toolkit, which is …
-
Critical NVIDIA Container Toolkit bug has widespread impact
All NVIDIA Container Toolkit versions up to 1.16.1 and GPU Operator instances up to version 24.6.1 are impacted by the flaw, which stems …
-
TeamTNT aims to take down cloud-based Docker containers, Kubernetes clusters
A new campaign by cryptojacking threat actor TeamTNT takes down Docker containers and Kubernetes clusters by targeting virtual private …
-
DockerSpy: Search for images on Docker Hub, extract sensitive information
DockerSpy scans Docker Hub for images and retrieves sensitive information, including authentication secrets, private keys, and other …
-
Docker Joins Movement To Dump Passwords for Security
Docker is depreciating password logins on its command-line interface with Docker single-sign-on interface enforcement. For as long as …
-
Making sense of secrets management on Amazon EKS for regulated institutions
Store secret and private keys used to encrypt and decrypt cardholder data in one (or more) of the following forms: Encrypted with a …
●●●