A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
A cybercrime group known as TeamTNT is using a crypto-mining worm to steal plaintext AWS credentials and config files from compromised Docker and Kubernetes systems. TeamTNT's cryptocurrency mining ...
Hundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc ...
A hacking group is currently mass-scanning the internet looking for Docker platforms that have API endpoints exposed online. The purpose of these scans is to allow the hacker group to send commands to ...
Asking a security expert about all of the potential security exploits that might exist in your production systems is like watching the movie Jaws immediately prior to taking a dip in the ocean: It's ...