Information security
fromThe Hacker News
4 days agoTOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
A TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.