Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: Risky Business
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 10   >   >>
RobF375
RobF375,
User Rank: Apprentice
10/4/2018 | 8:07:03 PM
Cartoon Caption
"Trying to promote your code to production again without an approved change window eh Bob?"
sdenrich
sdenrich,
User Rank: Guru
10/4/2018 | 3:47:15 PM
cartoon caption
Hey guys! when did we hire Tom Cruise!!!
3milio
3milio,
User Rank: Strategist
10/4/2018 | 1:01:56 PM
Re: Put your thinking cap on! We have new cartoon caption contest!
Ever since Larry got bit by that South American fruit bat, he's been acting a little strange.
3milio
3milio,
User Rank: Strategist
10/4/2018 | 12:58:43 PM
Re: Put your thinking cap on! We have new cartoon caption contest!
The latest fad in office ergonomics.
InfoSecJunky
InfoSecJunky,
User Rank: Apprentice
10/4/2018 | 8:52:04 AM
He violated our zero tolerance policy
He violated our zero tolerance policy!
Corruption
Corruption,
User Rank: Apprentice
10/3/2018 | 12:47:44 PM
Security Awareness Training
 

I think Jane in Accounting got the Bear trap!!!
lakers85
lakers85,
User Rank: Strategist
10/3/2018 | 8:02:02 AM
My boss told me to write the same sentence 500 times as punishment for my lapse in judgement
"I will not ask management to purchase NEW & SECURE, to replace 12 year old Network Devices...for obvious reasons"

"I will not ask management to purchase NEW & SECURE, to replace 12 year old Network Devices...for obvious reasons"

"I will not ask management to purchase NEW & SECURE, to replace 12 year old Network Devices...for obvious reasons"

"I will not ask management to purchase NEW & SECURE, to replace 12 year old Network Devices...for obvious reasons"
Noe4293
Noe4293,
User Rank: Apprentice
10/2/2018 | 5:01:54 PM
The New Guy
Looks like Jerry got tied up at work...
tspirawk
tspirawk,
User Rank: Apprentice
10/2/2018 | 11:20:28 AM
Repeat Offender
Looks like Bob fell for our internal phishing again!
SXDude
SXDude,
User Rank: Strategist
10/2/2018 | 8:50:42 AM
An email confirming it was a malicious attachment would have sufficed!!!!
An email confirming it was a malicious attachment would have sufficed!!!!
<<   <   Page 3 / 10   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4242
PUBLISHED: 2022-11-30
A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the ...
CVE-2022-38801
PUBLISHED: 2022-11-30
In Zkteco BioTime &lt; 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.
CVE-2022-38802
PUBLISHED: 2022-11-30
Zkteco BioTime &lt; 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-38803
PUBLISHED: 2022-11-30
Zkteco BioTime &lt; 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-45842
PUBLISHED: 2022-11-30
Unauth. Race Condition vulnerability in WP ULike Plugin &lt;= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.