Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Threat Actors Exploit Docker and Kubernetes for Crypto Mining

Amber | Attack Report
Download PDF

A new cryptojacking campaign that exploits Docker and Kubernetes environments to mine cryptocurrency by accessing exposed Docker API endpoints without authentication. The attack enables lateral movement within cloud infrastructures, allowing threat actors to compromise multiple systems by leveraging malicious Docker images and scripts. This campaign highlights the urgent need for enhanced security measures in containerized infrastructures to prevent exploitation.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox