Security News

Hackers Targeting WebLogic Servers and Docker APIs for Mining Cryptocurrencies
2022-09-16 10:58

Malicious actors such as Kinsing are taking advantage of both recently disclosed and older security flaws in Oracle WebLogic Server to deliver cryptocurrency-mining malware. The Kinsing actors have also been involved in campaigns against container environments via misconfigured open Docker Daemon API ports to launch a crypto miner and subsequently spread the malware to other containers and hosts.

How to deploy the Bitwarden self-hosted server with Docker
2022-08-17 13:55

One of the many reasons why this is so is because of the tool's flexibility, and a perfect illustration of that is the ability to deploy your very own Bitwarden server using Docker. Why would you want to deploy your own Bitwarden server? You might have incredibly sensitive information that you only entrust to your internal teams.

How to quickly deploy the Odoo ERP solution with Docker
2022-07-27 16:48

One such platform is Odoo, which happens to be one of the most popular open-source ERP solutions on the market. The only thing you'll need to deploy Odoo is a running server that supports Docker.

Thousands of GitHub, AWS, Docker tokens exposed in Travis CI logs
2022-06-15 07:21

For a second time in less than a year, the Travis CI platform for software development and testing has exposed user data containing authentication tokens that could give access to developers' accounts on GitHub, Amazon Web Services, and Docker Hub. Researchers at Aqua Security discovered that "Tens of thousands of user tokens" are exposed through the Travis CI API that offer access to more than 770 million logs with various types of credentials belonging to free tier users.

WatchDog hacking group launches new Docker cryptojacking campaign
2022-06-03 17:50

The WatchDog hacking group is conducting a new cryptojacking campaign with advanced techniques for intrusion, worm-like propagation, and evasion of security software. The hacking group targets exposed Docker Engine API endpoints and Redis servers and can quickly pivot from one compromised machine to the entire network.

How to create a Docker secret and use it to deploy a service
2022-05-24 15:39

How to create a Docker secret and use it to deploy a service. I'm going to show you how to create a secret with Docker and then how to use it to deploy a Docker service.

Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud
2022-04-22 02:30

LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux systems as part of an active malware campaign. With compromised cloud instances becoming a hotbed for illicit cryptocurrency mining activities, the findings underscore the need to secure containers from potential risks throughout the software supply chain.

Docker servers hacked in ongoing cryptomining malware campaign
2022-04-21 19:54

Docker APIs on Linux servers are being targeted by a large-scale Monero crypto-mining campaign from the operators of the Lemon Duck botnet. Cryptomining gangs are a constant threat to poorly secured or misconfigured Docker systems, with multiple mass-exploitation campaigns reported in recent years.

Cryptomining Attack Exploits Docker API Misconfiguration Since 2019
2021-12-29 14:26

The attack technique is script-based and dubbed "Autom", because it exploits the file "Autom.sh". Attackers have consistently abused the API misconfiguration during the campaign's active period, however the evasion tactics have varied - allowing adversaries to fly under the radar, wrote Aquasec's research arm Team Nautilus in a report published Wednesday.

How to deploy a Bitwarden server with Docker
2021-12-23 15:32

Are you looking to deploy an in-house password manager server? Jack Wallen shows you how with Bitwarden and Docker. If you're seriously concerned about security and would rather not save your password database on a third-party server, you might want to consider deploying your own Bitwarden server.