Exposed Docker APIs continue to be used by attackers to create new containers that perform cryptojacking. Earlier this year we reported on attackers utilizing insecure Docker and Kubernetes systems to ...
Threat actors are targeting cloud-based networks by exploiting misconfigured Docker APIs to gain access to containerized environments, then using the anonymity of Tor to hide their deployment of ...
The new variant of Docker-targeting malware skips cryptomining in favor of persistence, backdoors, and even blocking rivals from accessing exposed APIs. A newly discovered strain of a cryptomining ...
Container company Docker has acquired startup SocketPlane and its six-strong team to help add standard networking interfaces to Docker for increased portability of multi-container distributed apps.
Hackers are attempting to compromise Docker servers en masse via exposed APIs in order to spread cryptocurrency mining malware, according to researchers. Aqua Security claimed to have tracked the ...
A new attack campaign deploys malicious container images on cloud servers by exploiting insecure Docker Engine API endpoints. The malicious image contains a distributed denial-of-service (DDoS) botnet ...
Microsoft Open Technologies has been hard at work making sure its code works with the new Docker Orchestration APIs for spinning up containers. DockerCon 14 EU is taking place in Amsterdam this week, ...
Docker has racked up another acquisition: Tutum, a service for delivering Docker containers into production on nearly any cloud or host. Scott Jonston, senior vice president of product for Docker, ...
Microsoft Open Technologies has been hard at work making sure its code works with the new Docker Orchestration APIs for spinning up containers. DockerCon 14 EU is taking place in Amsterdam this week, ...