Slide 1: Docker Images from the Net: Unseen Dangers Lurking in the Layers. Slide 2: The Allure and the Abyss: Why Public Docker Images are a Double-Edged Sword. Slide 3: Risk 1: Trojan Horses in Containers - Malware Injection. Slide 4: Risk 2: Vulnerability Vestiges - The CVE Jungle. Slide 5: Risk 3: Config Chaos - Misconfigurations and Weaknesses. Slide 6: Risk 4: Supply Chain Sabotage - The Dependency Domino Effect. Slide 7: Risk 5: Secrets Spilled - Unintentional Data Exposure. Slide 8: Defense Strategy 1: Image Scanning - Your First Line of Inspection. Slide 9: Defense Strategy 2: Trust but Verify - Best Practices & Hardening. Slide 10: Conclusion: Container Security - A Shared Responsibility