We identified a malicious Docker Hub account that was hosting six malicious images intended to mine the cryptocurrency, Monero. (more…)
Read more »
In this article, we will explain why Docker images can contain sensitive information and give some examples of the type of secrets we found in public Docker images. Finally, we will compare our results to the ones we have with source code scanning. (more…)
Read more »
Containerization solutions are becoming increasingly common throughout the industry due to their vast applications in logically separating and packaging processes to run consistently across environ… (more…)
Read more »
Today we’re announcing that the Docker platform is integrating support for Kubernetes so that Docker customers and developers have the option to use both Kubernetes and Swarm to orchestrate container workloads. Register for beta access and check out the d... (more…)
Read more »
Learn about the new features, bug fixes, and breaking changes for Docker Engine... (more…)
Read more »