On Friday, cybersecurity researchers from Pen Test Partners publicly disclosed the problem, a privilege escalation vulnerability buried in how the software uses pipes. The vulnerability, tracked as ...
When Microsoft launched its Windows Subsystem for Linux (WSL) back in 2018, it was very clear why: It wanted to provide tools for developers building modern cloud applications. Microsoft needed a way ...
A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if the Enhanced Container Isolation (ECI) protection is active. The ...