La API de Docker es el objetivo de campañas de criptojacking que buscan crear botnets masivas.

La API de Docker es el objetivo de campañas de criptojacking que buscan crear botnets masivas.

Se ha descubierto a piratas informáticos utilizando la API de Docker Engine para apuntar a diferentes contenedores utilizando criptojackers y otros. malware. Los investigadores de ciberseguridad de Datadog, que recientemente observaron e informaron sobre una de esas campañas en un análisis en profundidad, señalaron que los delincuentes primero buscaron API de Docker Engine que estuvieran … Read more

Malware attacks on Docker Hub spread millions of malicious repositories

Malware attacks on Docker Hub spread millions of malicious repositories

Cybersecurity researchers from JFrog recently discovered three malicious campaigns in Docker Hub – Docker’s cloud-based registry service for storing and sharing container images. These campaigns contained millions of repositories that pushed generic trojan malware to the developers.  The conclusion of JFrog’s findings is that with open-source repositories such as Docker Hub, keeping them clean of … Read more

Docker vs Podman 2024 container management comparison

Docker vs Podman 2024 container management comparison

In the world of software development, the tools we use to package and run our applications are crucial. They can make the difference between a smooth, efficient workflow and a tangled mess of compatibility issues. Two major players in this field are Docker vs Podman, and as we move through 2024, the choice between them … Read more