The vulnerability is triggered when a cloud container pulls a malicious image from a registry. …read more

Source:: Threatpost