Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Threat Landscape
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 6 / 9   >   >>
camerobabe
100%
0%
camerobabe,
User Rank: Strategist
5/4/2018 | 10:10:26 AM
Re: Time for a new caption contest!
Dave just completed his "Insider Threat" training.
jcar195
100%
0%
jcar195,
User Rank: Apprentice
5/4/2018 | 9:20:56 AM
Re: Time for a new caption contest!
The yearly security training worked a little too well.
CKappenman
50%
50%
CKappenman,
User Rank: Apprentice
5/3/2018 | 11:45:33 AM
Cartoon Caption
You want to know what I'm doing?  I'm working on my disaster recovery plan. DUH!!!!!
GWAIN
100%
0%
GWAIN,
User Rank: Strategist
5/3/2018 | 11:15:25 AM
Under Here
I got an email saying my desktop was compromised.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/3/2018 | 9:42:28 AM
js019
"Oh, they just hired me to wait for things to go wrong."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/3/2018 | 9:35:10 AM
js018
"I'm just feeling very insecure right now."
JasonF217
50%
50%
JasonF217,
User Rank: Strategist
5/3/2018 | 9:34:50 AM
Caption
Look who's not in his mother's basement anymore!
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/3/2018 | 9:23:19 AM
js017
"Autocorrect. I texted my boss that I wanted a new ducking desk."
jrig1842
100%
0%
jrig1842,
User Rank: Strategist
5/3/2018 | 7:06:45 AM
Cyber Wars
The Boss has a Cyber Gauntlet, I don't feel so good........
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/2/2018 | 8:22:01 PM
js016
"Why aren't you?"
<<   <   Page 6 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-36260
PUBLISHED: 2021-09-22
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CVE-2021-39404
PUBLISHED: 2021-09-22
MaianAffiliate v1.0 allows an authenticated administrative user to save an XSS to the database.
CVE-2021-3583
PUBLISHED: 2021-09-22
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This...
CVE-2021-39339
PUBLISHED: 2021-09-22
The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.
CVE-2021-38153
PUBLISHED: 2021-09-22
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixe...