<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[&quot;Adversaries utilize the Container CLI&#x2F;API technique to manipulate containers for a variety of malicious purposes, taking advantage of their inherent flexibility and, at times, insufficiently secured configurations.&quot;]]></title><description><![CDATA[<p>"Adversaries utilize the Container CLI/API technique to manipulate containers for a variety of malicious purposes, taking advantage of their inherent flexibility and, at times, insufficiently secured configurations."</p><p>T1059.013 Container CLI/API in MITRE ATT&amp;CK Explained by Sıla Özeren Hacıoğlu via Picus Security from March 15, 2026 <a href="https://cybersec.picussecurity.com/s/t1059-013-container-cli-api-in-mitre-att-ck-explained-26385" rel="nofollow noopener"><span>https://</span><span>cybersec.picussecurity.com/s/t</span><span>1059-013-container-cli-api-in-mitre-att-ck-explained-26385</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/759df48d-1f41-41eb-8755-e078b11680a2/adversaries-utilize-the-container-cli-api-technique-to-manipulate-containers-for-a-variety-of-malicious-purposes-taking-advantage-of-their-inherent-flexibility-and-at-times-insufficiently-secured-configurations.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 12:55:13 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/759df48d-1f41-41eb-8755-e078b11680a2.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 03 Apr 2026 10:00:29 GMT</pubDate><ttl>60</ttl></channel></rss>