Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

I am using singularity sandboxes in my workflow for several reasons unrelated to security. However, after using it a bit, I am now wondering: is using a singularity sandbox an effective way to increase security by enforcing isolation / com… Continue reading Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

Fair warning – I am a security newbie.
In all container escape/breakout vulnerability scenarios I’ve read (CVE-2022-0185), the author assumes or states that the attacker already had shell or SSH access to the container. When I follow this … Continue reading What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?

I’m evaluating running Chromium without native sandboxing in a rootless container. A few points:

You can containerize Chrome using rootless containers with something like podman. This will utilize kernel user-namespaces to isolate the Chr… Continue reading What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?

How to connect the Compass GUI to a Docker-deployed MongoDB database

MongoDB is a widely used NoSQL database that can function well in containers if you know how to set it up. Learn how to connect the Compass GUI here.
The post How to connect the Compass GUI to a Docker-deployed MongoDB database appeared first on TechRe… Continue reading How to connect the Compass GUI to a Docker-deployed MongoDB database