Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: A Dog's Life
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 7   >   >>
PanamaVet
50%
50%
PanamaVet,
User Rank: Strategist
1/21/2019 | 8:29:13 AM
The Graduate
His favorite blog is Dog In The Middle attacks at DarkReading.com
uversaprod9
50%
50%
uversaprod9,
User Rank: Strategist
1/21/2019 | 12:53:47 AM
Paw-ke Man Go!
"Now, we come here to play Paw-ke Man Go!"
uversaprod9
50%
50%
uversaprod9,
User Rank: Strategist
1/20/2019 | 12:45:15 PM
"OK, Google... Squirrels!"
"After I repeatedly told her, 'No!' -  I gave up and taught her how to say, "OK Google... Squirrels!"
uversaprod9
100%
0%
uversaprod9,
User Rank: Strategist
1/20/2019 | 12:37:32 PM
Give a Dog a Phone
"Give a dog a bone...?!" At OUR house, it's, "Give a dog a PHONE...!"
uversaprod9
50%
50%
uversaprod9,
User Rank: Strategist
1/20/2019 | 12:36:24 PM
Puppy Post
"Our 'Less Screen Time' Family Policy is being whole-heartedly and doggedly dismissed...!"
uversaprod9
50%
50%
uversaprod9,
User Rank: Strategist
1/20/2019 | 12:35:01 PM
Dog Screen
"Sit," "Stay" and "Heel" is now "No Texting" - "No Posting" and  "Put the damn phone down!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/19/2019 | 8:20:35 PM
js08
"He just showed up at my doorstep one day without a geotag."
Joe Stanganelli
80%
20%
Joe Stanganelli,
User Rank: Ninja
1/18/2019 | 3:49:17 AM
js07
"I don't mind him using my phone. I mind that he's able to unlock it with FaceID."
clyles
50%
50%
clyles,
User Rank: Apprentice
1/17/2019 | 2:09:12 PM
A dog's Life
If we had kniown they would grow up ignoring us like this, we could have had children.
cdunn355
100%
0%
cdunn355,
User Rank: Strategist
1/17/2019 | 12:12:02 PM
I remember when...
I remember when we were trying to teach him to speak. Now, thanks to Star Trek, we have the universal translator!
<<   <   Page 4 / 7   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23381
PUBLISHED: 2021-04-18
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23374
PUBLISHED: 2021-04-18
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23375
PUBLISHED: 2021-04-18
This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23376
PUBLISHED: 2021-04-18
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23377
PUBLISHED: 2021-04-18
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.