Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once...
Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an...
Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well...
Researchers at TrendMicro have uncovered a new risk to Docker containers, a piece of malware that they have called “TrafficStealer.” The purpose...
A new cryptojacking campaign has been uncovered targeting vulnerable Docker and Kubernetes infrastructures as part of opportunistic attacks designed to illicitly mine...
Malicious actors such as Kinsing are taking advantage of both recently disclosed and older security flaws in Oracle WebLogic Server to deliver...
Software development and testing platform Travis CI confirmed the second incident of exposing its users’ data in less than a year. On...
LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux systems as part of an active malware campaign....
According to a report by Trend Micro, the hacking group identified as TeamTNT has been attacking Docker servers with exposed REST APIs...
Cybersecurity researchers are sounding the alarm bell over a new ransomware strain called “DarkRadiation” that’s implemented entirely in Bash and targets Linux...
RE:TERNAL is a centralised purple team simulation platform. Reternal uses agents installed on a simulation network to execute various known red-teaming techniques...
Researchers discovered a critical vulnerability in Docker that allows an attacker to take complete control of the host and the containers associated...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud’s speed for...
Dockernymous is a start script for Docker that runs and configures two individual Linux containers in order to act as an anonymization...
Researchers have detected a campaign in which compromised docker hosts use Shodan for carrying out cryptocurrency mining. Hackers scan for Docker hosts...
According to IT security audits specialists all versions of the Docker software are impacted by a race condition vulnerability that, if exploited,...
Microsoft says its official Microsoft images hosted in Docker Hub have not been compromised. The company behind Docker, a computer program developed...
In recent days, a still not identified hacker group got unauthorized access to a Docker database, a company dedicated to programmer software...
Docker Hub Hacked, sensitive data more than 190,000 accounts may have exposed. Docker Hub discovered the unauthorized access to a single Hub...
Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown attacker gained...
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The...