Inside a Docker Cryptojacking Exploit

Previous Video
Attack Simulation: Deconstructing an Attack in a Containerized Application
Attack Simulation: Deconstructing an Attack in a Containerized Application

Learn how a full-stack attack in a containerized application unfolds from the app layer, EC2 layer, to the ...

Next Video
SANS Webinar: Real World Challenges for PCI Compliant Containers
SANS Webinar: Real World Challenges for PCI Compliant Containers

Hear how the Lola.com team built a highly elastic and scalable infrastructure without worrying about underl...

Get Access to Threat Stack's Cloud Security Platform

Start Trial