{"id":2071,"date":"2018-10-28T23:22:18","date_gmt":"2018-10-28T22:22:18","guid":{"rendered":"https:\/\/werle.pro\/?p=2071"},"modified":"2018-10-28T23:22:18","modified_gmt":"2018-10-28T22:22:18","slug":"exposed-docker-apis-used-by-attackers-in-creation-of-new-containers-that-perform-cryptojacking","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2018\/10\/28\/exposed-docker-apis-used-by-attackers-in-creation-of-new-containers-that-perform-cryptojacking\/","title":{"rendered":"Exposed Docker Apis Used By Attackers In Creation Of New Containers That Perform Cryptojacking"},"content":{"rendered":"<p><a href=\"http:\/\/www.ehackingnews.com\/2018\/10\/exposed-docker-apis-used-by-attackers.html?m=1\">http:\/\/www.ehackingnews.com\/2018\/10\/exposed-docker-apis-used-by-attackers.html?m=1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.ehackingnews.com\/2018\/10\/exposed-docker-apis-used-by-attackers.html?m=1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-xp","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2071"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=2071"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2071\/revisions"}],"predecessor-version":[{"id":2072,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/2071\/revisions\/2072"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=2071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=2071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=2071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}