Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.
Honeypot activity exposed two credentials that the threat actor is using to host and distribute malicious container images, security vendor says.