By David Fiser, Jakub Urbanec and Jaromir Horejsi Misconfiguration is not novel. However, cybercriminals still find that it is an effective way to get their hands on organizations’ computing resources to use for malicious purposes and it remains a top security concern.
Source: AESDDoS Botnet Malware Infiltrates Containers via Exposed Docker APIs
Leave a Reply