Мы делали продукт, они — презентацию. Угадайте, кто выиграл полмиллиона
Мы сделали продакшен-решение под сложное ТЗ, собрали всё — от FastAPI и PostgreSQL до ELK и CI/CD. А победили ребята с презентацией в Figma и пустым сайтом. Жюри сказало, что «всё по бизнес-требованиям». Рассказываю, как проходил «самый масштабный хакатон страны» и почему он стал фарсом.
https://habr.com/ru/articles/964670/
#хакатон #лидеры_цифровой_трансформации #лцт #несправедливость #fastapi #разработка #postgresql #docker
How to Install #Docker Engine on #Ubuntu #VPS Server This article provides a guide for how to install Docker Engine on Ubuntu VPS server.
What is Docker?
Docker is an application that utilizes OS-level virtualization to provide software in bundles called containers. While you can run Docker on any VPS, Ubuntu remains its most popular OS of choice.
Containers provide an application's code, dependencies, libraries, and ...
Continued 👉 https://blog.radwebhosting.com/how-to-install-docker-engine-on-ubuntu-vps-server/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.raddemo.host #kvmvps #vpsguide #installguide

🚩 HIGH severity runC flaws threaten Docker isolation: attackers could escape containers & access hosts. No exploits yet, but risk is high for cloud-native & microservices deployments. Patch ASAP & restrict container privileges! https://radar.offseq.com/threat/dangerous-runc-flaws-could-allow-hackers-to-escape-bf6584fa #OffSeq #Docker #SecNews

WTF #Docker? (It's most likely me fucking up somewhere tho.)

How to Install and Run #Docker Engine on #AlmaLinux VPS (5 Minute Quick-Start Guide) This article provides a guide for how to install and run Docker Engine on AlmaLinux VPS server.
Introduction
Docker is a powerful platform that allows you to create, deploy, and manage containerized applications with ease. If you're using AlmaLinux as your server OS, you might be wondering how to get Docker up and running efficiently. This guide ...
Continued 👉 https://blog.radwebhosting.com/how-to-install-and-run-docker-engine-on-almalinux-vps-5-minute-quick-start-guide/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #installguide #vpsguide

Wrote a bit about container image sizes when coding in Go and Python, and how sometimes the Go images can end up using more repository space than the Python images.
https://mattwelke.com/posts/when-go-container-images-use-more-space-than-python
#docker #go #python #containers
📰 Critical Container Escape Flaws in runC Threaten Docker & Kubernetes
🚨 CRITICAL VULNERABILITY: Three new flaws in runC, the core runtime for Docker & Kubernetes, allow for container escape. Attackers could gain host access. This is a major threat to cloud environments. Patch immediately! #runC #Docker #Kubernetes
Pretty interesting how cross compiling on my main machine with a Ryzen 5950X and 64GB of RAM for ARM takes 8X as long as just compiling the docker on my Raspberry Pi 4. #Dev #Docker #Linux #Cybersecurity
It's been a bit light on news over the last 24 hours, but we've got a couple of important updates: a widespread phishing scam targeting lost iPhone users and critical container escape vulnerabilities in runC. Let's dive in:
Lost iPhone Phishing Scam ⚠️
- The Swiss National Cyber Security Centre (NCSC) is warning iPhone users about a sophisticated phishing scam.
- Scammers are using information from a lost device's lock screen message (model, colour, contact details) to send convincing SMS or iMessage texts, claiming the phone has been found.
- The goal is to trick victims into entering their Apple ID credentials on a fake "Find My" website, allowing attackers to disable Activation Lock and potentially resell the device. Always ignore unsolicited messages and never click links; Apple will not contact you via SMS or email about a found device.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/lost-iphone-dont-fall-for-phishing-texts-saying-it-was-found/
Dangerous runC Container Escape Flaws 🛡️
- Three new vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) have been disclosed in runC, the container runtime used by Docker and Kubernetes.
- These flaws could allow an attacker to bypass container isolation and gain root-level write access to the underlying host system, primarily by exploiting issues with bind-mounts and /proc redirection.
- While exploitation requires the ability to start containers with custom mount configurations, organisations should update to runC versions 1.2.8, 1.3.3, 1.4.0-rc.3 or later, activate user namespaces, and consider using rootless containers as mitigation.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/
#CyberSecurity #ThreatIntelligence #Phishing #SocialEngineering #AppleID #Vulnerability #runC #ContainerSecurity #Docker #Kubernetes #InfoSec #CyberAttack #IncidentResponse
Usar docker con tu usuario sin sudo https://myblog.clonbg.es/usar-docker-con-tu-usuario-sin-sudo/ #Docker #Seguridad #Terminal https://clonbg.es

Otro motivo para usar `#podman` en lugar de `#docker`: El usuario `root`, dentro del pod es el usuario con el que ejecutas `podman` en el anfitrión, y no `root`.
#Kubernetes: Newly disclosed #vulnerabilities in the #runC container runtime used in #Docker & Kubernetes (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) could be exploited to bypass isolation restrictions & get access to the host system (escape):
#k8s