#ContainerSecurity

ActiveStateactivestate
2026-02-05

Hardened Images: 28. Unmanaged Risk: 0. The scoreboard says it all.

Don’t let a vulnerability fumble your production. Power your infrastructure with a championship-ready foundation with ActiveState’s Secure Containers.

Find your winning lineup and browse our catalog: catalog.activestate.com/?utm_s

2026-01-30

It's been a packed 24 hours in the cyber world with critical zero-day vulnerabilities, evolving threat actor tactics, significant data breaches, and shifts in government policy. Let's dive in:

Critical Zero-Days in Ivanti EPMM and SmarterMail ⚠️
- Ivanti has patched two critical code-injection zero-days (CVE-2026-1281, CVE-2026-1340) in its Endpoint Manager Mobile (EPMM) platform, actively exploited to achieve unauthenticated remote code execution.
- These flaws, with CVSS scores of 9.8, allow attackers to execute arbitrary code and access sensitive data like user credentials, device info, and potentially location data. Temporary RPM scripts are available, but a permanent fix is due in Q1 2026.
- SmarterMail also addressed a critical unauthenticated RCE (CVE-2026-24423, CVSS 9.3) in its ConnectToHub API, and a medium-severity NTLM relay vulnerability (CVE-2026-25067) that could lead to credential coercion. Users are urged to update to Build 9511 (for RCE) and Build 9518 (for NTLM relay) immediately.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/two-
📰 The Hacker News | thehackernews.com/2026/01/smar

Evolving Android Malware and Chinese APT Tactics 🛡️
- A new Android malware campaign is leveraging Hugging Face as a trusted repository to distribute thousands of polymorphic APK variants, disguised as a security app called TrustBastion. It exploits Accessibility Services to steal credentials for financial services like Alipay and WeChat.
- China-linked APTs are actively deploying sophisticated malware: "PeckBirdy," a JScript-based C2 framework, is used by both financially motivated cybercrime groups targeting Chinese gambling sites and espionage groups against Asian government entities.
- UAT-8099, another China-linked threat actor, is targeting vulnerable IIS servers in Asia, particularly Thailand and Vietnam, with BadIIS SEO malware. They use web shells, PowerShell, and legitimate tools like GotoHTTP for remote access and persistence, creating hidden user accounts like "admin$" or "mysql$".

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
⚫ Dark Reading | darkreading.com/cyberattacks-d
📰 The Hacker News | thehackernews.com/2026/01/chin

High-Profile Breaches and IP Theft Conviction 🚨
- Coupang, a major Korean e-commerce site, is under police investigation for allegedly obstructing a probe into a data breach affecting 33.7 million customer accounts, with its CEO questioned and a smashed laptop recovered from a river.
- Thousands more Oregon residents are being notified of health data exposure from the TriZetto data breach, which occurred in November 2024 but wasn't discovered until almost a year later, impacting over 700,000 patients across multiple US states.
- A former Google engineer, Linwei Ding, has been convicted of economic espionage and theft of trade secrets for stealing over 2,000 confidential AI-related documents to benefit a China-based startup he founded.

🗞️ The Record | therecord.media/coupang-acting
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2026/01/ex-g

Broadening Cyber Threats and Law Enforcement Responses 🌍
- A senior Secret Service official highlighted the "staggering" weakness in the Internet Assigned Numbers Authority (IANA) domain registration system, which facilitates phishing and fraudulent advertising due to insufficient identity validation.
- Google, in collaboration with Cloudflare and Lumen, disrupted IPIDEA, a China-based residential proxy network, removing millions of devices used by cybercriminals and espionage groups, though a significant portion remains active.
- Illicit cryptocurrency flows surged to a record $158 billion in 2025, primarily driven by sanctions-linked activity (Russia, Iran, Venezuela), nation-state use, and improved attribution, despite a slight drop in illicit activity's share of total volume.
- A comprehensive analysis of 418 law enforcement actions (2021-mid-2025) reveals that extortion, malware, and hacking are the most targeted criminal acts, with arrests dominating responses and significant public-private collaboration, particularly from US agencies.

🤫 CyberScoop | cyberscoop.com/secret-service-
🤫 CyberScoop | cyberscoop.com/ipidea-proxy-ne
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/badg

US Policy Shifts and Microsoft's NTLM Retirement 🏛️
- The White House's OMB rescinded Biden-era mandates for Software Bills of Materials (SBOMs) and software attestation, arguing they prioritised compliance over genuine security, sparking debate among security professionals about the potential impact on software supply chain security.
- CISA faced scrutiny for releasing insider threat guidance shortly after its acting director, Madhu Gottumukkala, reportedly uploaded sensitive documents to a public ChatGPT instance, highlighting a potential disconnect between policy and practice.
- Microsoft announced plans to disable the 30-year-old NTLM authentication protocol by default in future Windows releases, phasing it out in favour of more secure Kerberos-based alternatives due to NTLM's inherent vulnerabilities to relay and pass-the-hash attacks.

⚫ Dark Reading | darkreading.com/application-se
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/micr

AI Security and Developer Challenges 💡
- A BellSoft survey indicates nearly half of Java developers prefer delegating container security to vendors of hardened containers, despite security being the most important factor in image choice and 23% experiencing container-related incidents.
- An op-ed argues that the US can win the AI race against China not just through advanced models, but by leveraging its robust private-sector cybersecurity industry, which fosters trust and security through real-world threat exposure and market-driven defence.
- Tenable introduced "Tenable One AI Exposure" to its exposure management portfolio, designed to detect, map, and govern the use of agentic and generative AI platforms across enterprise infrastructure, addressing concerns about shadow AI and data leakage.

🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/ai-race-china-u
⚫ Dark Reading | darkreading.com/cyber-risk/ten

#CyberSecurity #ThreatIntelligence #ZeroDay #RCE #Vulnerability #Malware #APT #AndroidSecurity #IISSecurity #DataBreach #EconomicEspionage #IPTheft #Cybercrime #LawEnforcement #SBOM #NTLM #MicrosoftSecurity #AISecurity #ContainerSecurity #InfoSec

Rene Robichaudnerowild
2026-01-30
2026-01-25

Your MCP server might be the weakest link—here's the data. @josh.bressers.name scanned 161 MCP images and found 9,000 vulns / 263 criticals. Read the breakdown and fixes: anchore.com/blog/analyzing-the

#MCP #SoftwareSupplyChain #ContainerSecurity #DevSecOps

NikitaNikki27
2026-01-24

Some fantastic news to start the week
I'm looking forward to bringing that energy to Container Days London next month.
I'll be co-presenting "Anatomy of a Container Breach: A Live Hacking and Defense Demo"

If you're going to be in London, let's connect!

ActiveStateactivestate
2026-01-14

The wagers are in, and for many DevSecOps teams, the scores are looking a little lean. While containerization is the category of the year, the clues from 250 DevSecOps leaders show that many are still struggling to clear the board of CVEs and risk.

Download your copy: activestate.com/resources/2026

2026-01-10

@josh.bressers.name scanned 161 MCP containers. Found 9,000 vulnerabilities. 263 were critical.

"Software ages like milk, not wine." His analysis breaks down what's actually being deployed in the MCP ecosystem—and what to do about it.

anchore.com/blog/analyzing-the

#MCP #ContainerSecurity

2026-01-04

MCP is having a moment. @josh.bressers.name wanted to know: what are we actually shipping?

9,000 vulns
263 critical findings
36K+ NPM packages
Outdated base images

Not fear-mongering—just data-driven reality. Read his analysis: anchore.com/blog/analyzing-the

#MCP #ContainerSecurity

2025-12-26

Your MCP server might be the weakest link—here's the data. @josh.bressers.name scanned 161 MCP images and found 9,000 vulns / 263 criticals. Read the breakdown and fixes: anchore.com/blog/analyzing-the

#MCP #SoftwareSupplyChain #ContainerSecurity #DevSecOps

2025-12-20

@josh.bressers.name scanned 161 MCP containers. Found 9,000 vulnerabilities. 263 were critical.

"Software ages like milk, not wine." His analysis breaks down what's actually being deployed in the MCP ecosystem—and what to do about it.

anchore.com/blog/analyzing-the

#MCP #ContainerSecurity

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-12-19

Docker Inc. has made its catalog of over 1,000 hardened container images free and open source under Apache 2.0, built on Debian and Alpine for superior security with minimal vulnerabilities. 🚀🔒 Developers, enterprises like Adobe and Crypto.com, and the community now get secure-by-default foundations—no paywalls or lock-in. AI tools even recommend swaps for existing setups. Details: heise.de/en/news/Docker-Inc-ma #Docker #ContainerSecurity #OpenSource #Newz

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-12-19

Docker Inc. macht gehärtete Docker-Images jetzt kostenlos verfügbar! 🛡️ Diese minimalisierten Abbilder reduzieren die Angriffsfläche und stärken die Container-Sicherheit für alle Entwickler.

heise.de/news/Docker-Inc-macht

#Docker #ContainerSecurity #DevOps #Newz

2025-12-18

MCP is having a moment. @josh.bressers.name wanted to know: what are we actually shipping?

9,000 vulns
263 critical findings
36K+ NPM packages
Outdated base images

Not fear-mongering—just data-driven reality. Read his analysis: anchore.com/blog/analyzing-the

#MCP #ContainerSecurity

2025-12-17

Docker vừa công bố tích hợp ảnh container được phân quyền (DHI) miễn phí và mã nguồn mở cho tất cả. Ưu điểm: Ảnh nền an toàn, tối giản, xây dựng trên Alpine và Debian, có SBOM/SLSA Level 3, minh bạch 100% CVE, giấy phép Apache 2.0. Giai đoạn trả phí vẫn còn cho SLA nghiêm ngặt, FIPS/STIG, vá lỗi dài hạn. Bước tiến lớn cho container an toàn mặc định. #Docker #ContainerSecurity #MãNguồnMở #Linux #TechNews

**Tags**: #Docker #ContainerSecurity #OpenSource #Linux #TechNews | #DockerVi #BảoMậtConta

ActiveStateactivestate
2025-12-16

If containers are now the backbone of modern delivery, why are we still securing them as an afterthought? 🤔

This article walks through a bottom-up hardening process that removes unnecessary components, verifies everything from source, and gives teams a security posture that’s proactive.

🔗 : activestate.com/blog/container

2025-11-23

Your MCP server might be the weakest link—here's the data. @josh.bressers.name scanned 161 MCP images and found 9,000 vulns / 263 criticals. Read the breakdown and fixes: anchore.com/blog/analyzing-the

#MCP #SoftwareSupplyChain #ContainerSecurity #DevSecOps

2025-11-21

**Last Chance! We start in ONE HOUR!** ⏳Neil Levine and Nurit from Echo are ready to show you the proactive path to container security.
Get the playbook for eliminating vulnerabilities at the source and keep it that way.
Join us LIVE:** go.anchore.com/anchore-and-ech
#hardenedimages #ContainerSecurity #Anchore #Echo

2025-11-20

MCP is having a moment. @josh.bressers.name wanted to know: what are we actually shipping?

9,000 vulns
263 critical findings
36K+ NPM packages
Outdated base images

Not fear-mongering—just data-driven reality. Read his analysis: anchore.com/blog/analyzing-the

#MCP #ContainerSecurity

2025-11-20

🚨 **Final Call: Just 24 Hours Until Our Live Demo!** 🚨
Tomorrow, us and our friends at Echo are showing you how to quit the vulnerability patching cycle for good. If your team is buried under a backlog of container vulnerabilities, you need to see this demo on **root-cause elimination.** We'll show you the power of CVE-free base images and comprehensive SBOMs.
Don't miss "From Reactive Scanning to Proactive Security."
Register... go.anchore.com/anchore-and-ech #DevSecOps #ContainerSecurity #FinalCall

ActiveStateactivestate
2025-11-19

The EU Cyber Resilience Act (CRA) is about to fundamentally change how software teams build and ship products in the EU.

We break down how teams can prepare without slowing innovation.

Link to the full guide: activestate.com/blog/eu-cyber-

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst