A new attack campaign is targeting publicly accessible Docker, Hadoop, Confluence, and Redis deployments by exploiting common misconfigurations and known vulnerabilities. The attackers deploy…
Tag:
Docker
-
-
Security researchers have found four vulnerabilities in Docker components that could allow attackers to access host operating systems from within containers. One of those…
-
Application SecurityNewsSecurity
Misconfigured Docker API endpoints allow attackers to deliver DDoS botnet agent
The oracle.sh executable was originally written in Python code and was compiled with Cython (C-Extensions for Python). The code implements several different DDoS methods…
-
A new security analysis of the 4 million container images hosted on the Docker Hub repository revealed that more than half contained at least…