22K Open, Vulnerable Containers Found Exposed on the Net

Attackers can remotely access the infrastructure to install, remove or encrypt any application that the affected companies are running in the cloud.

About author:

Comments are closed here.