cryptojacking

CyberArk Unveils Open Source Pen Testing Tool for Kubernetes
CyberArk today launched an open source penetration testing framework, dubbed Kubesploit, for testing Kubernetes environments. Eviatar Gerzi, a cybersecurity researcher at CyberArk Labs, says that as more instances of Kubernetes clusters are ...

Sophos Adds Ability to Scan Container Images
Sophos this week announced it is extending its Cloud Optix service for cloud security posture management (CSPM) to include support for container image scanning. Richard Beckett, senior product marketing manager for public ...

Palo Alto Networks Finds Cryptojacking Worm Using Containers
The Unit 42 research arm of Palo Alto Networks revealed this week that it has discovered an instance of cryptojacking employing containers in Docker Engine that includes a worm capable of replicating ...

Inside a Docker Cryptojacking Exploit
Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the ...