Articles by Tag #containersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System

Security researcher evilsocket.net (Simone Margaritelli) published information about several vulnerabilities in CUPS that allow for remote code execution (RCE)

Learn More 15 0Sep 28 '24

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

Comprehensive Guide to Docker Security Best Practices

Docker Best Practices for Security Securing Docker environments is critical to protecting...

Learn More 4 0Dec 21 '24

Agentic Container Security with Snyk MCP Server

Learn how Snyk's MCP server brings agentic security to container workflows. Automate vulnerability scanning and base image recommendations directly within your AI-powered IDE.

Learn More 2 0Aug 14

Abusing Ubuntu 24.04 features for root privilege escalation

With the recent release of Ubuntu 24.04, we at Snyk Security Labs thought it would be interesting to examine the latest version of this Linux distribution to see if we could find any interesting privilege escalation vulnerabilities.

Learn More 2 0Sep 11 '24

Docker MCP Catalog & Toolkit: Building Smarter AI Agents with Ease

Introduction: What Is Docker MCP and Why It Matters The rise of agent-based AI applications, powered...

Learn More 1 0May 20

Best Practices for Continuous Vulnerability Management

By integrating security practices into the development lifecycle, providing continuous education and training, and automating security workflows, organizations can effectively mitigate risks from open-source supply chain incidents, AI-generated code, and emerging threats. Snyk provides the tools and resources to establish a proactive security culture and ensure application security.

Learn More 1 0Oct 30 '24

Container Security Best Practices for AI/ML Projects

In the era of rapid advancements in artificial intelligence and machine learning, deploying models...

Learn More 1 0Oct 28 '24

Cloud Security Architecture - Multi-Cloud Defense Strategies

# Cloud Security Architecture: Multi-Cloud Defense Strategies ## Executive Summary Multi-cloud environments introduce complex security challenges re...

Learn More 1 0Aug 11

Kubernetes Secrets and ConfigMaps: Managing Configuration and Sensitive Data Securely

Kubernetes Secrets and ConfigMaps In Kubernetes, managing configuration and sensitive data...

Learn More 0 0Dec 23 '24

Mastering Docker Security: A Comprehensive Guide to Protecting Your Containers

Docker Security: Comprehensive Guide to Best Practices Docker is a popular...

Learn More 0 0Dec 21 '24