Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers.
from Threatpost | The first stop for security news http://ift.tt/2v2qrN3
via https://ifttt.com/ IFTTT
No comments:
Post a Comment