Click any tag below to further narrow down your results
Links
Over 10,000 Docker images on Docker Hub are leaking sensitive credentials, including API keys and cloud access tokens, according to security firm Flare. Many of these leaks originate from unmonitored developer accounts, putting critical infrastructure at risk. Even when developers remove secrets, the underlying credentials often remain active, leaving systems vulnerable.
Researchers revealed a serious security flaw in Docker's Ask Gordon AI that allowed attackers to execute code and steal sensitive data. The vulnerability, called DockerDash, exploited unverified metadata in Docker images, which the AI treated as executable commands. Docker has fixed the issue in version 4.50.0.
A high-severity path traversal vulnerability was found in Docker Compose's support for OCI artifacts, allowing attackers to write arbitrary files on the host system. This flaw could be triggered by running commands like "docker compose ps" with malicious Compose files, potentially leading to unauthorized access. Users are urged to upgrade to Docker version v2.40.2 or later to mitigate the issue.
BunkerWeb is an open-source web application firewall built on NGINX that offers easy integration with various environments like Linux and Docker. It features a user-friendly interface and a plugin system for customization, providing essential security measures out of the box. Users can choose between an open-source version and a PRO version with enhanced features.
Docker Hardened Images (DHI) provide developers with secure, minimal container images that are easy to adopt without workflow disruptions. They feature near-zero vulnerabilities, verifiable software bills of materials (SBOMs), and offer extended support for long-lived workloads. This solution is open-source under the Apache 2.0 license.
Docker's Hardened Images (DHI) are now free, offering improved security for various base images. They shift responsibility for certain vulnerabilities to Docker, allowing teams to focus on their application layers. This article outlines how to integrate DHI into vulnerability management practices.
ADTrapper is a platform for analyzing Windows Active Directory authentication logs. It offers over 50 detection rules, anomaly analysis, and visualizations to help cybersecurity professionals identify threats. Users can upload logs anonymously and run the tool easily with Docker.
Three serious vulnerabilities in the runC container runtime could allow attackers to bypass isolation and gain root access to the host system. The flaws affect multiple versions of runC, with potential exploits requiring the ability to configure custom mounts. While no active exploitation has been reported, developers recommend using mitigations like user namespaces and rootless containers.
Docker Desktop 4.50 introduces significant improvements for developers, focusing on seamless debugging, enhanced security, and AI integration. Key features include free access to Docker Debug, enhanced IDE support, and enterprise-level controls for managing security policies. These updates aim to streamline workflows while maintaining productivity and compliance.
Tangled is a tool for red team professionals that automates phishing campaigns using calendar invites in Outlook and Gmail. It runs on Docker, making installation straightforward, and is designed for ethical use in security research.
Docker is introducing a new way to run coding agents in isolated environments using container-based sandboxes. This approach allows agents to access necessary resources without compromising the local system's safety, addressing security concerns as agents become more autonomous. The current experimental version supports Claude Code and Gemini CLI, with plans for broader agent compatibility.
This article outlines a series of ten hands-on labs focused on Model Context Protocol (MCP) vulnerabilities, each based on real-world exploits. It provides both vulnerable and secure implementations, allowing users to reproduce attacks and understand mitigation strategies in a practical setting. Comprehensive instructions and proof captures accompany each challenge.
Docker has released Docker Hardened Images (DHI), a set of secure, minimal images for developers. These images are open source and aim to enhance software supply chain security, making it easier for all developers to build applications securely.
Model Context Protocol (MCP) enhances the interaction between AI agents and external tools, but it introduces significant security risks, such as command injection flaws and misconfigurations. Developers must adopt new security practices that focus on policy over traditional static analysis, utilizing Docker's solutions to mitigate risks while maintaining agile workflows.
Cameradar is a Docker-based tool designed for detecting open RTSP hosts and automating dictionary attacks to access camera streams. It provides a user-friendly reporting feature and allows the use of custom dictionaries for credentials and stream routes. Users can easily configure and execute scans on specified target networks to identify vulnerabilities in connected cameras.
Docker has addressed a critical vulnerability identified as CVE-2025-9074 that could allow unauthorized access to sensitive information. Users are encouraged to update their Docker installations to mitigate potential security risks associated with this flaw.
Docker has launched the MCP Catalog and Toolkit in Beta, aimed at improving the developer experience for Model Context Protocols (MCPs) by streamlining discovery, installation, and security. This initiative involves collaboration with major tech partners and enhances the ease of integrating MCP tools into AI applications through secure, containerized environments.
The article discusses the challenges developers face when building and using tools with the Model Context Protocol (MCP), including issues related to runtime management, security, discoverability, and trust. It highlights how Docker can serve as a reliable MCP runtime, offering a centralized gateway for dynamic tool management, along with features to securely handle sensitive data. The introduction of the Docker MCP Catalog aims to simplify the discovery and distribution of MCP tools for developers and authors alike.
Docker has introduced Docker Hardened Images (DHI), which are secure-by-default container images that significantly reduce the attack surface and streamline software supply chain security. These images, designed for modern production environments, are continuously updated, minimize vulnerabilities, and integrate seamlessly into existing workflows without sacrificing flexibility or usability.
Docker's reliance on a persistent daemon with root privileges has raised security concerns, leading many to explore alternatives like Podman. Podman's daemonless architecture enhances security, reduces resource usage, and simplifies integration with systemd, making it a compelling choice for modern container management. The transition from Docker to Podman is seamless, allowing existing workflows to continue with minimal adjustments.
Hard-coded secrets in Docker images pose significant security risks, as they can be inadvertently leaked and exploited by attackers. A recent analysis of 15 million Docker images on DockerHub revealed over 100,000 valid secrets, many of which date back years, highlighting the need for organizations to regularly audit their Docker images to prevent potential breaches.
The XZ Utils backdoor, originally discovered in 2024, continues to pose a risk as several Docker images built from compromised Debian packages still contain the malicious code. Despite efforts to notify Debian maintainers for removal, these infected images remain publicly available, highlighting the persistent threat of backdoored software in the container ecosystem. Binarly's research emphasizes the need for continuous monitoring and detection of such vulnerabilities to protect the software supply chain.
The XZ-Utils backdoor, discovered in March 2024, remains present in at least 35 Linux images on Docker Hub, posing risks to users and organizations. Despite being reported, Debian has chosen not to remove the compromised images, citing low risk, which has raised concerns among researchers about the potential for accidental use in automated builds. Users are advised to ensure they are using updated versions of the affected library to mitigate risks.
Echo offers CVE-free base images for Dockerfiles that are automatically patched and hardened, ensuring that enterprises can quickly reduce their vulnerability counts to zero. Their solution is designed for long-term support, making cloud security management more efficient and attractive.
Wyrm is an open-source Red Team security testing framework written in Rust, designed for authorized security testing. Users are advised to change default credentials for security and to back up profiles before updating, as the project is under active development with planned updates and new features. It provides various functionalities, including encrypted communication and dynamic payload generation, while emphasizing legal and authorized use only.
Docker introduces Hardened Images to assist companies in achieving FedRAMP compliance more efficiently and cost-effectively. These images come pre-configured for FIPS compliance and STIG hardening, significantly reducing the manual workload and helping organizations meet stringent security requirements while maintaining a reduced attack surface and continuous monitoring for vulnerabilities.
Markdown Ninja simplifies the process of publishing Markdown-based websites and newsletters with a straightforward command using Docker, eliminating the need for complex setups. Users can easily publish their content while ensuring security and trust through responsible disclosure channels. Documentation is readily available for both usage and development.
The article discusses a critical vulnerability in the GitHub Model Context Protocol (MCP) integration that allows attackers to exploit AI assistants through prompt injection attacks. By creating malicious GitHub issues, attackers can hijack AI agents to access private repositories and exfiltrate sensitive data, highlighting the inadequacy of traditional security measures and the need for advanced protections like Docker's MCP Toolkit.
A user raised an issue on the MinIO GitHub repository asking about the absence of a new Docker image for a recent security release. They inquired whether this was expected and requested that a new release be pushed for Docker installation methods.