Docker Honeypot Reveals Cryptojacking as Most Common Cloud Threat
Misconfigured Docker daemons allow remote attackers to gain full control over a Docker instance and perform operations, such as deploying new containers and even escalating to the host.