Security News

Docker launches new business plan with changes to the Docker Desktop license
2021-08-31 15:00

Docker announced a new subscription plan for enterprises and free access to Docker Desktop for personal use, educational institutions, non-commercial open-source projects and small businesses. First, Docker is introducing a new product subscription: Docker Business.

Security alert: The threat is coming from inside your Docker container images
2021-08-27 20:03

Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls. There's a new threat cybersecurity teams need to watch out for: malicious Docker containers hiding on legitimate sites like Docker Hub, where Aqua Security's threat research arm, Team Nautilus, found five images accounting for a whopping 120,000 pulls by unsuspecting users.

EasyWSL turns Linux docker images into a Windows 10 WSL distro
2021-08-15 14:21

If you can't find your favorite Windows Subsystem for Linux distribution available in the Microsoft Store, a new program called EasyWSL can convert almost any Linux Docker image into a WSL distro. The Microsoft Store offers many prebuilt Linux WSL distributions such as Fedora, Ubuntu, Alpine, Kali, Debian, and more.

How to define DNS in Docker containers
2021-07-08 18:27

Jack Wallen shows you how to configure specific DNS servers for your Docker container deployments. You do not want your containers using the same DNS as your hosts.

Wormable DarkRadiation Ransomware Targets Linux and Docker Instances
2021-06-24 20:05

Cybersecurity researchers have disclosed a new ransomware strain called "DarkRadiation" that's implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control communications. "The ransomware is written in Bash script and targets Red Hat/CentOS and Debian Linux distributions," researchers from Trend Micro said in a report published last week.

Docker expands its trusted container offerings
2021-05-28 19:51

That's why Docker has expanded and improved its trusted content offerings for software developers with the launch of the Docker Verified Publisher Program. Docker, which shed its container engine and control plane to Mirantis in 2019, has been focusing on improving and securing its Docker Hub, the most popular service for finding and sharing container images.

How to use Docker Bench for Security to audit your container deployments
2021-04-08 17:38

Docker Bench for Security is a simple way of checking for common best practices around your Docker deployments in production. One such tool is a pre-built container, called Docker Bench for Security-it does a great job of auditing your container host and the currently running deployments.

Malicious Docker Cryptomining Images Rack Up 20M Downloads
2021-03-30 20:22

At least 30 malicious images in Docker Hub, with a collective 20 million downloads, have been used to spread cryptomining malware, according to an analysis. The malicious images have raked in around $200,000 from cryptomining, according to Aviv Sasson, researcher with Palo Alto Networks' Unit 42, who found and reported the malicious activity.

Docker Hub images downloaded 20M times come with cryptominers
2021-03-29 18:30

Researchers found that more than two-dozen containers on Docker Hub have been downloaded more than 20 million times for cryptojacking operations spanning at least two years. Docker Hub is the largest library of container applications, allowing companies to share images internally or with their customers, or the developer community to distribute open-source projects.

New Docker Container Escape Bug Affects Microsoft Azure Functions
2021-01-27 07:59

Cybersecurity researcher Paul Litvak today disclosed an unpatched vulnerability in Microsoft Azure Functions that could be used by an attacker to escalate privileges and escape the Docker container used for hosting them. Following disclosure to Microsoft, the Windows maker is said to have "Determined that the vulnerability has no security impact on Function users, since the host itself is still protected by another defense boundary against the elevated position we reached in the container host."