News
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could ...
Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet.
While most of us have likely spun up a virtual machine (VM) for one reason or another, venturing into the world of containerization with software like Docker is a little trickier. While the tools ...
The attack chain essentially involves breaking into misconfigured Docker APIs to execute a new container based on the Alpine ...
A new exposed Docker API attack uses Tor to hide hackers, install malware, and block admin access, sparking major security ...
What makes this important, even vital, news to the larger world of system administrators, datacenter managers, and cloud architects, is that Google, Red Hat, and Parallels are now helping build the ...
The new variant of Docker-targeting malware skips cryptomining in favor of persistence, backdoors, and even blocking rivals ...
Optimized for the VMware hypervisor, Photon OS is an easy-to-use container OS with all the advantages of virtual hardware With the Photon open source project, VMware hopes to build a community around ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results