Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: Risky Business
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 10   >   >>
atkinsonr
0%
100%
atkinsonr,
User Rank: Strategist
10/2/2018 | 7:46:38 AM
Re: Put your thinking cap on! We have new cartoon caption contest!
I saw this done on Mission: Impossible last night
ronhollow
50%
50%
ronhollow,
User Rank: Apprentice
10/1/2018 | 8:17:21 PM
He failed the fingerprint scanner.
He failed the fingerprint scanner.
Ed_E
60%
40%
Ed_E,
User Rank: Apprentice
10/1/2018 | 3:46:33 PM
I told you active countermeasures would work.
I told you active countermeasures would work.
jwiggins930
0%
100%
jwiggins930,
User Rank: Guru
10/1/2018 | 11:26:12 AM
Re: Put your thinking cap on! We have new cartoon caption contest!
Ergonomics is said to provide therapy for your back.
rita4321
0%
100%
rita4321,
User Rank: Apprentice
10/1/2018 | 7:18:32 AM
Re: ccj7
great 
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:50:35 PM
ccj15
"Well, Tim, some people might have thought the picnic basket was suspicious."
Joe Stanganelli
43%
57%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:47:27 PM
ccj14
"He's our artificial-intelligence guy. We're hoping to replace him with an actual-intelligence guy."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:46:02 PM
ccj13
"I'd like to help you, Bill, but I wouldn't what Time Reporting Code to use."
Joe Stanganelli
43%
57%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:42:43 PM
ccj12
"I wouldn't bother him. He's tied up at the moment."
Joe Stanganelli
20%
80%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:41:18 PM
ccj11
"It's a honeypot. Now we just wait for the bear."
<<   <   Page 4 / 10   >   >>


7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
IoT Vulnerability Disclosure Platform Launched
Dark Reading Staff 10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27673
PUBLISHED: 2020-10-22
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
CVE-2020-27674
PUBLISHED: 2020-10-22
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
CVE-2020-27675
PUBLISHED: 2020-10-22
An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash vi...
CVE-2020-3996
PUBLISHED: 2020-10-22
Velero (prior to 1.4.3 and 1.5.2) in some instances doesn&acirc;&euro;&trade;t properly manage volume identifiers which may result in information leakage to unauthorized users.
CVE-2020-15680
PUBLISHED: 2020-10-22
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerabil...