Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: Risky Business
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 6 / 10   >   >>
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:36:26 PM
ccj1
"Hey, Jim, while you're up..."
corpit
corpit,
User Rank: Apprentice
9/27/2018 | 1:12:53 PM
Sit-to-Stand Desk
What you get when you ask IT for a Sit-to-Stand Desk.
BrooklynNellie2
BrooklynNellie2,
User Rank: Strategist
9/27/2018 | 9:57:43 AM
DevOps
You do NOT want to get on the wrong side of the new DevOps manager.
ThomasW452
ThomasW452,
User Rank: Strategist
9/27/2018 | 5:51:59 AM
IT Problems
At least this time the problem is not between the keyboard and the Chair
exmart
exmart,
User Rank: Apprentice
9/26/2018 | 1:21:54 PM
Your cube has been infected
These ransomewares are really getting out of hand...
dereks13
dereks13,
User Rank: Apprentice
9/25/2018 | 11:12:38 AM
who needs Phishme?
"This is our most effective security awareness training tool yet!"
Trevor_
Trevor_,
User Rank: Apprentice
9/25/2018 | 10:13:20 AM
Re: Cartoon Caption
Apt-get remove Bob --purge personal items
Kristendean80
Kristendean80,
User Rank: Strategist
9/23/2018 | 9:19:12 PM
Cartoon caption
Are you sure this is how we get our data into the cloud?
aacyberreport
aacyberreport,
User Rank: Strategist
9/22/2018 | 8:18:42 AM
Cartoon caption
Im not sure I like this top down management approach!
mhornbeck740
mhornbeck740,
User Rank: Apprentice
9/21/2018 | 10:31:46 AM
Literalist at work, boss said do the job hanging from the ceiling.
Name that Toon: Risky Busine

Literalist at work, boss said do the job hanging from the ceiling.

{

You want anything else boss, Yes do the job hanging from the ceiling.

Here is what you get from a literalist.

}
<<   <   Page 6 / 10   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-46411
PUBLISHED: 2022-12-04
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges.
CVE-2022-46412
PUBLISHED: 2022-12-04
An issue was discovered in Veritas NetBackup Flex Scale through 3.0. A non-privileged user may escape a restricted shell and execute privileged commands.
CVE-2022-46413
PUBLISHED: 2022-12-04
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal.
CVE-2022-46414
PUBLISHED: 2022-12-04
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Unauthenticated remote command execution can occur via the management portal.
CVE-2022-44721
PUBLISHED: 2022-12-04
CrowdStrike Falcon 6.44.15806 allows an administrative attacker to uninstall Falcon Sensor, bypassing the intended protection mechanism in which uninstallation requires possessing a one-time token. (The sensor is managed at the kernel level.)