Tag: docker
-
Portainer: Open-source Docker and Kubernetes management
Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Dock… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/01/portainer-open-source-docker-kubernetes-management/
-
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
Cybersecurity researchers have uncovered a new malware campaign that targets publicly exposed Docket API endpoints with the aim of delivering cryptocu… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/new-malware-targets-exposed-docker-apis.html
-
Novel malware campaign sets sights on misconfigured Docker APIs
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/novel-malware-campaign-sets-sights-on-misconfigured-docker-apis
-
Cryptojacking campaign targets exposed Docker APIs
A malware campaign targets publicly exposed Docker API endpoints to deliver cryptocurrency miners and other payloads. Researchers at Datadog uncovered… First seen on securityaffairs.com Jump to article: securityaffairs.com/164668/cyber-crime/malware-campaign-docker-api-endpoints.html
-
Commando Cat Docker Cryptojacking: Alert Prevention Tips
Recent reports have unveiled a concerning cyber threat orchestrated by a group identified as Commando Cat. This threat actor has been actively engagin… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/commando-cat-docker-cryptojacking-alert-prevention-tips/
-
Hackers Employing New Techniques To Attack Docker API
Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart (re… First seen on gbhackers.com Jump to article: gbhackers.com/new-hacking-techniques-docker-api/
-
Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances
The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly secured Docker instances to d… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/commando-cat-cryptojacking-attacks.html
-
‘Commando Cat’ Digs Its Claws into Exposed Docker Containers
First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/-commando-cat-digs-its-claws-into-exposed-docker-containers
-
Unsecured Docker servers subjected to ongoing cryptojacking campaign
Tags: dockerFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/unsecured-docker-servers-subjected-to-ongoing-cryptojacking-campaign
-
Drei Fragen und Antworten: Warum sind Repositories so beliebt bei Angriffen?
In den letzten Wochen wurden viele Angriffe auf Software-Repositories bekannt: XZ, Python oder zuletzt Docker Hub. Repos scheinen es Hackern leichtzum… First seen on heise.de Jump to article: www.heise.de/news/Drei-Fragen-und-Antworten-Warum-sind-Repositories-so-beliebt-bei-Angriffen-9716252.html
-
Angriffe auf Docker-Hub 3 Millionen Repositories kompromittiert
Aktuelle Untersuchungen des Forschungsteams von JFrog haben bedeutende Sicherheitsmängel auf Docker-Hub aufgedeckt, der weltweit führenden Plattform, … First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/05/03/angriffe-auf-docker-hub-3-millionen-repositories-kompromittiert/
-
JFrog entdeckt Malware auf Docker Hub – Millionen Repositories sind mit bösartigen Metadaten kompromittiert
First seen on security-insider.de Jump to article: www.security-insider.de/malware-angriffe-docker-hub-neue-erkenntnisse-a-058b4e928e829231d5a8ef9cb93b18ba/
-
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious imageless containers over the past… First seen on thehackernews.com Jump to article: thehackernews.com/2024/04/millions-of-malicious-imageless.html
-
Angriffe auf Docker-Hub 3 Millionen Repositories kompromittiert
Aktuelle Untersuchungen des Forschungsteams von JFrog haben bedeutende Sicherheitsmängel auf Docker-Hub aufgedeckt, der weltweit führenden Plattform, … First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/05/03/angriffe-auf-docker-hub-3-millionen-repositories-kompromittiert/
-
JFrog entdeckt Angriffe auf Docker Hub 3 Millionen Repositories kompromittiert
Da Docker Hub weiterhin eine entscheidende Rolle im Entwickler-Ökosystem spielt, müssen die Sicherheitspraktiken weiterentwickelt werden, um diese Sch… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/jfrog-entdeckt-angriffe-auf-docker-hub-3-millionen-repositories-kompromittiert/a37280/
-
Attackers Planted Millions of Imageless Repositories on Docker Hub
Tags: dockerFirst seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/attackers-planted-millions-of-imageless-repositories-on-docker-hub
-
Millions of Malicious Containers Found on Docker Hub
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malicious-containers-found-docker/
-
2,8 Millionen Docker-Hub-Repositories mit Malware oder Phishing verseucht
First seen on heise.de Jump to article: www.heise.de/news/2-8-Millionen-Docker-Hub-Repositories-mit-Malware-oder-Phishing-verseucht-9705402.html
-
Malicious repositories proliferate in Docker Hub
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/malicious-repositories-proliferate-in-docker-hub
-
Millions of Malicious >>Imageless<< Docker Hub Repositories Drop Malware
In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams, underscoring the sop… First seen on gbhackers.com Jump to article: gbhackers.com/millions-of-malicious-imageless-docker-hub-repositories/
-
Millions of Docker repos found pushing malware, phishing sites
Three large-scale campaigns have targeted Docker Hub users, planting millions of repositories designed to push malware and phishing sites since early … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/millions-of-docker-repos-found-pushing-malware-phishing-sites/
-
Docker Hub Users Targeted With Imageless, Malicious Repositories
JFrog raises an alarm after finding three large-scale malware campaigns targeting Docker Hub with imageless repositories. The post ises an alarm after… First seen on securityweek.com Jump to article: www.securityweek.com/docker-hub-users-targeted-with-imageless-malicious-repositories/
-
Cloud-y Linux Malware Rains on Apache, Docker, Redis & Confluence
Spinning YARN cyberattackers wielding a Linux webshell are positioning for broader cloud compromise by exploiting common misconfigurations and a known… First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/cloud-y-linux-malware-rains-apache-docker-redis-confluence
-
Linux Malware Targets Docker, Apache Hadoop, Redis and Confluence
First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linux-malware-targets-docker/
-
Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining
Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part … First seen on thehackernews.com Jump to article: thehackernews.com/2024/03/hackers-exploit-misconfigured-yarn.html
-
Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware
Hackers are targeting misconfigured servers running Apache Hadoop YARN, Docker, Confluence, or Redis with new Golang-based malware that automates the … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-target-docker-hadoop-redis-confluence-with-new-golang-malware/
-
Docker, Kubernetes und co.: Hacker können aus Containern auf Hostsysteme zugreifen
Die Schwachstellen dafür beziehen sich auf Buildkit und das CLI-Tool runc. Eine davon erreicht mit einem CVSS von 10 den maximal möglichen Schweregrad… First seen on golem.de Jump to article: www.golem.de/news/docker-kubernetes-und-co-hacker-koennen-aus-containern-auf-hostsysteme-zugreifen-2402-181875.html
-
Docker Swarm floriert auch drei Jahre nach der Übernahme durch Mirantis
Swarm ist ein integraler Bestandteil der Mirantis Kubernetes Engine. Kunden haben dadurch für ihre Container-Workloads die Wahl zwischen Kubernetes- u… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/docker-swarm-floriert-auch-drei-jahre-nach-der-uebernahme-durch-mirantis/a32701/
-
Maschinenidentitäten durch öffentlich zugängliche Docker-Images gefährdet
Tags: dockerLetztlich ist das Einbinden von CA-Zertifikaten oder anderen Zertifikaten in ein Image ein Rezept für einen nur schwer aufzudeckenden Sicherheitsvorfa… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/maschinenidentitaeten-durch-oeffentlich-zugaengliche-docker-images-gefaehrdet/a34840/
-
Bereitstellung von Cloud-nativen Anwendungen: Sysdig und Docker partnern
Die Angriffsflächen in der Cloud sind größer und die Angreifer bewegen sich schneller. Fehlende Aggregation und Korrelation von Datensätzen, die in ve… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bereitstellung-von-cloud-nativen-anwendungen-sysdig-und-docker-partnern/a35473/

