
Container infrastructure can be exploited in under one hour
Criminals are having a field day with misconfigured containers, installing cryptocurrency miners and various backdoors without breaking a sweat. According to a new report from Aqua Security Software, it takes less than an hour to compromise vulnerable software container infrastructure. As reported by Silicon Angle, attackers are using bots to target misconfigured Docker APIs and are capable of gaining access …
Tovább a bejegyzéshez- Egyéb kategória, IT hírek, Vállalati IT
- container, exploited, hour, infrastructure
- 2021.06.22.