News
Security researchers have identified a new cyber-threat targeting publicly exposed instances of the Docker Engine API. In this campaign, attackers exploit misconfigurations to deploy a malicious ...
In the container software Docker Desktop, attackers can access the Docker engine and subsequently the file system of the host system from malicious containers. Updated software is available to close ...
During an update, Docker Desktop attempts to delete files and subfolders in the path “C:\ProgramData\Docker\config” with elevated rights. However, this directory does not usually exist by default. “C: ...
Docker Extensions allow Docker Desktop to integrate with a wide range of partner tools for software supply chain security, CI/CD, Kubernetes deployment, and more. Docker is extending its popular ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results