Articles by Tag #containersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System

Security researcher evilsocket.net (Simone Margaritelli) published information about several vulnerabilities in CUPS that allow for remote code execution (RCE)

Learn More 15 0Sep 28 '24

Comprehensive Guide to Docker Security Best Practices

Docker Best Practices for Security Securing Docker environments is critical to protecting...

Learn More 4 0Dec 21 '24

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

Abusing Ubuntu 24.04 features for root privilege escalation

With the recent release of Ubuntu 24.04, we at Snyk Security Labs thought it would be interesting to examine the latest version of this Linux distribution to see if we could find any interesting privilege escalation vulnerabilities.

Learn More 2 0Sep 11 '24

Best Practices for Continuous Vulnerability Management

By integrating security practices into the development lifecycle, providing continuous education and training, and automating security workflows, organizations can effectively mitigate risks from open-source supply chain incidents, AI-generated code, and emerging threats. Snyk provides the tools and resources to establish a proactive security culture and ensure application security.

Learn More 1 0Oct 30 '24

Container Security Best Practices for AI/ML Projects

In the era of rapid advancements in artificial intelligence and machine learning, deploying models...

Learn More 1 0Oct 28 '24

Docker MCP Catalog & Toolkit: Building Smarter AI Agents with Ease

Introduction: What Is Docker MCP and Why It Matters The rise of agent-based AI applications, powered...

Learn More 0 0May 20

Mastering Docker Security: A Comprehensive Guide to Protecting Your Containers

Docker Security: Comprehensive Guide to Best Practices Docker is a popular...

Learn More 0 0Dec 21 '24

Kubernetes Secrets and ConfigMaps: Managing Configuration and Sensitive Data Securely

Kubernetes Secrets and ConfigMaps In Kubernetes, managing configuration and sensitive data...

Learn More 0 0Dec 23 '24