As per reports, threat Actors are exploiting Docker remote API servers to deploy SRBMiner, a crypto miner, on compromised systems, as highlighted in a recent Trend Micro report. The attack begins with a discovery process where public-facing Docker API hosts are identified. After that, the attacker checks for gRPC methods to control various Docker functionalities such as health checks, SSH forwarding, and file synchronization. The key aim is to create containers and use them to mine XRP cryptocurrency by deploying SRBMiner from GitHub. In this campaign, the adversary takes advantage of the gRPC protocol to bypass security measures and gain control of the Docker host. This allows them to execute their crypto mining operations covertly. Trend Micro also observed the exploitation of Docker remote API servers to spread other malware, such as perfctl, which creates a Docker container with a malicious image and Base64-encoded payloads. This payload delivers a binary disguised as a PHP file and launches a further attack.
Microsoft has released its September 2025 Patch Tuesday security updates, addressing 81 vulnerabilities, including two publicly disclosed zero-day flaws (CVE-2025-55234 and CVE-202...
Rockwell Automation has issued a critical advisory for a vulnerability tracked as CVE-2025-7350, affecting its Stratix industrial Ethernet switches. The flaw, rated 9.6 CVSS 3.1 sc...
In June 2025, Chess.com suffered a data breach when attackers exploited a third-party file transfer tool used by the platform. The intrusion took place between June 5 and June 18, ...