<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Container Security on Tia N. List - Threat Intelligence Briefings</title><link>https://zarguell.github.io/tia-n-list/tags/container-security/</link><description>Recent content in Container Security on Tia N. List - Threat Intelligence Briefings</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>tia@example.com (Tia N. List)</managingEditor><webMaster>tia@example.com (Tia N. List)</webMaster><lastBuildDate>Sun, 15 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://zarguell.github.io/tia-n-list/tags/container-security/index.xml" rel="self" type="application/rss+xml"/><item><title>AppsFlyer SDK crypto-stealer 💎, LockBit ransomware attacks 🔒, Windows RRAS RCE patches 🛡️, Docker security guide 🐳</title><link>https://zarguell.github.io/tia-n-list/posts/2026-03-15-daily-summary/</link><pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate><author>tia@example.com (Tia N. List)</author><guid>https://zarguell.github.io/tia-n-list/posts/2026-03-15-daily-summary/</guid><description>Attackers compromised the AppsFlyer Web SDK to inject cryptocurrency-stealing JavaScript that swaps wallet addresses during Bitcoin, Ethereum, and Solana transactions while preserving normal functionality. Ransomware operations including LockBit 5.0 and Akira continue targeting critical infrastructure in energy, healthcare, and food sectors while Microsoft issued out-of-band hotpatches for Windows RRAS remote code execution flaws and CIS released Docker hardening guidance.</description></item><item><title>CrackArmor Linux flaws 🔴, Chrome zero-days, Handala wiper, PlugX APT, supply chain 📦</title><link>https://zarguell.github.io/tia-n-list/posts/2026-03-13-daily-summary/</link><pubDate>Fri, 13 Mar 2026 00:00:00 +0000</pubDate><author>tia@example.com (Tia N. List)</author><guid>https://zarguell.github.io/tia-n-list/posts/2026-03-13-daily-summary/</guid><description>CrackArmor vulnerabilities expose millions of Linux systems to root privilege escalation while Chrome zero-days enable active remote code execution attacks. Iran-linked Handala expands destructive wiper campaigns against financial targets and a China-nexus actor employs PlugX malware in regional supply chain compromises.</description></item><item><title>React2Shell critical RCE 🔥, Chrome zero-day exploited 🌐, AI conversation scams 🤖, Docker credential leaks 🐳, Spiderman bank phishing 🏦</title><link>https://zarguell.github.io/tia-n-list/posts/2025-12-11-daily-summary/</link><pubDate>Thu, 11 Dec 2025 00:00:00 +0000</pubDate><author>tia@example.com (Tia N. List)</author><guid>https://zarguell.github.io/tia-n-list/posts/2025-12-11-daily-summary/</guid><description>React2Shell vulnerability affects hundreds of thousands of web systems with unauthenticated RCE, while Chrome&amp;rsquo;s eighth zero-day enables browser-based attacks without user interaction. Attackers are leveraging AI conversations to deliver AMOS infostealer and 10,000+ Docker containers are leaking production credentials alongside sophisticated banking phishing services targeting European financial institutions.</description></item></channel></rss>