informa
undefined MIN READ
video

Attacking Developers Using 'Shadow Containers'

Sagie Dulce describes why developers are such attractive targets and how the Docker API can be exploited to use one of developers' favorite tools against them in sneaky, obfuscated attacks.
Editors' Choice
Robert Lemos, Contributing Writer, Dark Reading
Karen Spiegelman, Features Editor
Robert Lemos, Contributing Writer, Dark Reading