Tech

Hackers exploit container technology to carry out supply chain attacks

Cybercriminals are beginning to use malicious container images as a way to install crypto miners on their corporate networks, but they can also be used as part of supply chain attacks targeting cloud-native environments.

According to a new blog post, cybersecurity firm Aqua Security uses a malicious container image to damage a threat investigation team, Team Nautilus, when it performs a daily scan of Docker Hub to detect malicious activity. We have discovered some supply chain attacks that endanger people.

Hackers exploit container technology to carry out supply chain attacks

Source link Hackers exploit container technology to carry out supply chain attacks

Back to top button