A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel. To go along with the “Dirty Pipe” Linux security bug coming to light, two researchers ...
Everyone's heard the term, but what exactly are containers? The software enabling this technology comes in many forms, with Docker as the most popular. The recent rise in popularity of container ...
Containers are considered to be a standard way of deploying these microservices to the cloud. Containers are better than virtual machines in almost all ways except security, which may be the main ...
Working out the security consequences of containerization can be tricky: what if a user inside a container needs access to one hardware device, but isn’t trusted to administer other hardware? The ...