Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Docker Makes 1,000 Hardened Images Free and Open Source

Docker Makes 1,000 Hardened Images Free and Open Source

Posted on December 19, 2025December 19, 2025 By CWS

Docker introduced this week that it has made greater than 1,000 safe pictures free and open supply for builders.

In Could, the corporate introduced the discharge of Docker Hardened Pictures (DHI), a catalog of hardened pictures designed to assist strengthen enterprise provide chain safety. 

The pictures are constantly scanned and up to date to remove — or no less than preserve to a minimal — the variety of exploitable CVEs.

As well as, the photographs run as non-root by default, they’re minimal to scale back the assault floor, they meet compliance requirements, and can be found for a number of distributions.

The DHI catalog was created in partnership with software program growth and safety firms equivalent to Cloudsmith, GitLab, Grype, JFrog, Microsoft, Neo4j, NGINX, Sonatype, Sysdig, and Wiz.

Once they had been launched, the hardened pictures had been a part of a business providing and positioned behind a paywall. Nevertheless, Docker introduced this week that DHI is now free and open supply, with greater than 1,000 hardened pictures made out there to all builders. 

Based on Docker, for transparency, each picture comes with proof of authenticity, an SBOM, CVE knowledge, and SLSA Construct Stage 3 provenance.

Whereas the fundamental DHI is now out there totally free, Docker continues to be providing business variations for enterprises with strict safety or regulatory wants. Commercial. Scroll to proceed studying.

With attackers more and more exploiting vulnerabilities throughout the software program provide chain, securing containers has develop into a mission-critical crucial. The significance of this space is underscored by a surge in enterprise capital in the direction of startups that provide hardened, vulnerability-free container pictures. 

Examples embody Echo, which in latest months raised $50 million in seed and Collection A funding, and Chainguard, which lately introduced a $280 million progress funding spherical. Chainguard has raised a complete of practically $900 million and was valued at $3.5 billion previous to the most recent funding spherical. 

The sector’s momentum is additional supported by market forecasts. The container safety business is valued at roughly $3 billion in 2025 and is projected to exceed $20 billion over the following decade.

Associated: Uncovered Docker APIs Seemingly Exploited to Construct Botnet

Associated: Docker Desktop Vulnerability Results in Host Compromise

Associated: Docker Hub Customers Focused With Imageless, Malicious Repositories

Security Week News Tags:Docker, Free, Hardened, Images, Open, Source

Post navigation

Previous Post: Hackers Targeting HubSpot Users in Targeted Phishing Attack
Next Post: Scripted Sparrow Uses Automation to Generate and Send their Attack Messages

Related Posts

Oasis Security Secures 0M for Identity Management Innovation Oasis Security Secures $120M for Identity Management Innovation Security Week News
CISA Warns of Exploited DELMIA Factory Software Vulnerabilities CISA Warns of Exploited DELMIA Factory Software Vulnerabilities Security Week News
Ivanti EPM Update Patches Critical Remote Code Execution Flaw Ivanti EPM Update Patches Critical Remote Code Execution Flaw Security Week News
Israel Leverages Iran’s Surveillance for Strategic Advantage Israel Leverages Iran’s Surveillance for Strategic Advantage Security Week News
All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher Security Week News
US Health Firm Data Breach Exposes 140,000 Records US Health Firm Data Breach Exposes 140,000 Records Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark