Inside a Docker Cryptojacking Exploit

preview_player
Показать описание
Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. He’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.
Рекомендации по теме
Комментарии
Автор

Insightful video on Docker cryptojacking! What are the key indicators to spot a cryptojacking exploit early in a Docker environment?

JossOrtan
Автор

"You know", "you know", "you know", "you know"... I DO NOT, that's why I'm watching this

ValeriyD
Автор

can you dumb this down like 1000% bro? put this sheet in layman's terms.

avteching