Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: It's A Dog's Life
Oldest First  |  Newest First  |  Threaded View
Page 1 / 9   >   >>
BobD889
50%
50%
BobD889,
User Rank: Apprentice
4/1/2016 | 5:22:13 PM
Caption
I keep telling him that Fidonet isn't a thing any more, but he just won't listen...
StepAheadPR
67%
33%
StepAheadPR,
User Rank: Strategist
4/1/2016 | 6:37:50 PM
Name that Toon: It's A Dog's Life
BlackHat hackers getting more sophisticated by the day: we make it so easy with end point solutions that look like a dog's breakfast. 
erbernal
50%
50%
erbernal,
User Rank: Apprentice
4/2/2016 | 12:48:42 PM
Re: Caption
He's come pretty far from only sniffing the rear ends of packets.
cmahanna068
100%
0%
cmahanna068,
User Rank: Apprentice
4/2/2016 | 1:36:04 PM
caption
When you said you were hiring a "cybersecurity watchdog", I had a different mental picture.
JamesS659
50%
50%
JamesS659,
User Rank: Apprentice
4/2/2016 | 7:29:20 PM
Caption
It's one of those new White Russian Terriers.
fredmjeffers
50%
50%
fredmjeffers,
User Rank: Apprentice
4/4/2016 | 8:22:09 AM
Caption
Why yes, we ARE proud of him! He's only 3 course hours away from a earning is Bachelor's from Strayer.
bkscarface
50%
50%
bkscarface,
User Rank: Strategist
4/4/2016 | 9:36:02 AM
IT's a dog's life !
WHo's on first, dogs on second, bow-wow on thrid !
bkscarface
50%
50%
bkscarface,
User Rank: Strategist
4/4/2016 | 9:36:10 AM
IT's a dog's life !
WHo's on first, dogs on second, bow-wow on third !
jwiggins930
50%
50%
jwiggins930,
User Rank: Guru
4/4/2016 | 11:41:30 AM
Cartoon
He's viewing the video surveilance to secure the perimeter.
MarcM
50%
50%
MarcM,
User Rank: Strategist
4/4/2016 | 11:58:05 AM
Packet Sniffer
When you said that you had an advanced Packet Sniffing system, I did not know it would have the teest to take a bite out of malware!
Page 1 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23478
PUBLISHED: 2021-09-22
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
CVE-2020-23481
PUBLISHED: 2021-09-22
CMS Made Simple 2.2.14 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Field Definition text field.
CVE-2020-23469
PUBLISHED: 2021-09-22
gmate v0.12+bionic contains a regular expression denial of service (ReDoS) vulnerability in the gedit3 plugin.
CVE-2021-21991
PUBLISHED: 2021-09-22
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server...
CVE-2021-21992
PUBLISHED: 2021-09-22
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service ...