Hundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners
This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT).
Docker is a technology that allows you to perform operating system level virtualization. An incredible number of companies and production hosts are running Docker to develop, deploy and run applications inside containers.
You can interact with Docker via the terminal and also via remote API. The Docker remote API is a great way to control your remote Docker host, including automating the deployment process, control and get the state of your containers, and more. With this great power comes a great risk — if the control gets into the wrong hands, your entire network can be in danger.
Top 5 Security News
Backdoored GitHub accounts spewed secret sneakerbot software
RSAC 2019: TLS Markets Flourish on the Dark Web
Web Authentication: What It Is and What It Means for Passwords
Google Discloses Unpatched ‘High-Severity’ Flaw in Apple macOS Kernel