![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV60ycag3gu19fGfBY_Q4zNcxY0p1dxw9j1AUl1ZjhUHOEj1jwT23M-UTQ_FR32i9FMaKoSE7POh9-eZ_U8a620DwdQtcHRvPSj5IUASrCgsOXV4b0TWPEWYWxW9AXJ167zMChZtkBNAdz8lMM-Azz2YO_WP0Qmj1MTI6kH1BHZ-kPQl_MvMGnl_zRuDjY/s1600/docker-hub.png)
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks.
“Over four million of the repositories in Docker Hub are imageless and have no content except for the repository
Source:: The Hackers News