Worm

Palo Alto Networks Finds Cryptojacking Worm Using Containers

The Unit 42 research arm of Palo Alto Networks revealed this week that it has discovered an instance of cryptojacking employing containers in Docker Engine that includes a worm capable of replicating ...
Inside a Docker Cryptojacking Exploit

Inside a Docker Cryptojacking Exploit

Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the ...