Attack Uses Docker Containers To Hide, Persist, Plant Malware

Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers.
Recent Posts




































































































































































































































































































Start Your Free Trial No Commitment
Detect, prevent, and respond to attacks— even malware-free intrusions—at any stage, with next-generation endpoint protection.