Docker Registries Expose Hundreds of Orgs to Malware, Data Theft | Threatpost
If you were wondering how an attacker can gain access to your organization when you were so careful to validate your software and your laptops and your employees, what out for how they run your software.
Docker base images have long been the target of the more sophisticated attacker now. Let’s face it, creating and setting up tomcat to run your platform isn’t really something that any development team can do so why not use a prebuilt image? It can be so easy to setup a repository and start with a known good base image but watch out for the wolf in sheep’s clothing.
https://threatpost.com/docker-registries-malware-data-theft/152734/
Categories: General
Comments (0)
Trackbacks (0)
Leave a comment
Trackback