Offline
The Docker Engine API is abused to deploy a cryptocurrency miner on compromised containers. Exposed Docker API endpoints without authentication are a big part of the infection chain. The TTPs used by the hackers in [...]
Continue reading...
Continue reading...