Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Threat Landscape
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 7 / 9   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/2/2018 | 8:21:47 PM
js015
"Okay, it's not a very good breach-preparedness plan, but where the heck is your plan, Cheryl?!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/2/2018 | 8:19:17 PM
js014
"Don't mind my scratching my butt against the carpet. I caught a worm."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/2/2018 | 8:17:51 PM
js013
"Shh! You'll scare the phish away."
pgrieser
50%
50%
pgrieser,
User Rank: Apprentice
5/2/2018 | 6:36:57 PM
Re: Time for a new caption contest!
He returned from Black Hat a changed man.
tdrought
100%
0%
tdrought,
User Rank: Apprentice
5/2/2018 | 9:40:29 AM
Name that
Mark, you checking your Bitcoin again?
EKramer62
50%
50%
EKramer62,
User Rank: Apprentice
5/2/2018 | 9:27:50 AM
Cartoon Camption

"No, I can't tell you who stole your chair. Just go find another one down in the conference room."

ketch011409
100%
0%
ketch011409,
User Rank: Apprentice
5/1/2018 | 6:17:46 PM
Time for a new caption contest!
Yes Frank, those are actually Real-Time Cyber Threat Maps showing cyberattacks.  No Frank, it isn't SkyNet launching missiles to begin Judgement Day.
glazarou
100%
0%
glazarou,
User Rank: Apprentice
5/1/2018 | 1:14:48 PM
Re: Time for a new caption contest!
Way to take compression to the next level Chuck.
jafreyman
50%
50%
jafreyman,
User Rank: Apprentice
5/1/2018 | 11:21:43 AM
Rodney
Rodney, you can wear that helmet and hide under the desk, but the Russian's are still tracking you!
BrianofBoston
100%
0%
BrianofBoston,
User Rank: Strategist
5/1/2018 | 10:11:10 AM
Caption
Rodney tries to join the hidden network.
<<   <   Page 7 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's &quot;extractArchive&quot; function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.