TeamTNT Continues to Target Exposed Docker API

Lacework Labs Key Takeaways Exposed Docker APIs continue to be targeted by TeamTNT Docker Hub continues to be leveraged for hosting malicious images. TeamTNT’s arsenal expands into Golang brute force utilities.   Caught In The Honeypot – Again! Lacework Labs recently caught a new TeamTNT Docker image posing as an Apache server targeting exposed Docker [...]

Read More...

The post TeamTNT Continues to Target Exposed Docker API appeared first on Lacework.

Article Link: TeamTNT Continues to Target Exposed Docker API - Lacework