A threat actor is deploying various payloads, including Golang binaries and shell scripts, to exploit publicly exposed Docker API endpoints for remote access and cryptocurrency mining.
View full story…