Sept. 14, 2022, 1 p.m. | Jai Vijayan, Contributing Writer, Dark Reading

Dark Reading www.darkreading.com

Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.

cloud containers docker malicious teamtnt

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Digital Trust Cyber Transformation Senior

@ KPMG India | Mumbai, Maharashtra, India

Security Consultant, Assessment Services - SOC 2 | Remote US

@ Coalfire | United States

Sr. Systems Security Engineer

@ Effectual | Washington, DC

Cyber Network Engineer

@ SonicWall | Woodbridge, Virginia, United States

Security Architect

@ Nokia | Belgium