Security Digest | Information security news and advice from TechTarget's network| December 19, 2018 | | | | | | Advertisement | | | | | EXPERT ADVICE | | How hackers use Docker APIs for cryptojacking | Remote access puts Docker APIs in a vulnerable position. Expert Dave Shackleford explains how hackers abuse Docker APIs to carry out cryptojacking attacks. (SearchCloudSecurity.com) | | | How a flaw in Apple DEP misuses an MDM server | Hackers are able to enroll their devices in an organization's MDM servicer via a flaw in Apple DEP. Expert Michael Cobb explains how hackers conduct these attacks. (SearchSecurity.com) | | | | About This E-Newsletter This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for. TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com Copyright 2018 TechTarget. All rights reserved. | | |
No comments:
Post a Comment