Attacking Developers Using ‘Shadow Containers’

Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Source: Dark Reading

Leave a comment!

Your email address will not be published. Required fields are marked *