Researchers at Trend Micro have recently spotted malicious activity abusing systems running misconfigured Docker containers.
Microsoft issued a security advisory for a remote code execution (RCE) vulnerability that exists on the Windows Host Compute Service Shim (hcsshim) library, an open source tool used to import Docker containers and run on Windows systems.
You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.
A new attack that uses Docker containers to hide, persist and plant malware was demonstrated at Black Hat by a team of security researchers from Aqua Security.