In my last post "Docker for Automating Honeypots or Malware Sandboxes" some people were worried about Docker not being safe enough to use it as a malware sandbox, at least for now, given for example the article From webshell to docker container escape wit...
Read more »
Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications, whether on laptops, data center… (more…)
Read more »
Monitoring is essential to know the state of our running applications. Using InfluxDB, Grafana and cAdvisor, we will setup a scalable monitoring solution for Docker Swarm. (more…)
Read more »
We examine the four major deployment methods to help your team achieve Continuous Delivery with Docker outlining each of their advantages and disadvantages... (more…)
Read more »
Abuse of the Docker API allows remote code execution on targeted system, which enables hackers to escalate and persists thanks to novel attacks called Host Rebinding Attack and Shadow Containers. (more…)
Read more »