Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.
from Dark Reading https://ift.tt/t370Tmy
via IFTTT
Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.
from Dark Reading https://ift.tt/t370Tmy
via IFTTT