Cybersecurity

Threat Actors Leverage Docker Swarm and Kubernetes to Mine Cryptocurrency at Scale

Threat actors exploit vulnerabilities in container orchestration technologies, particularly misconfigured Docker API endpoints, to compromise containers and cloud hosts to deploy a crypto miner.