Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Beat the Heat
Newest First  |  Oldest First  |  Threaded View
Page 1 / 6   >   >>
printershredder
50%
50%
printershredder,
User Rank: Apprentice
9/25/2019 | 8:55:23 AM
Beat the Heat: misreading the thermostat
Delores was a literal programmer preferring fixed values in source code wherever possible and badly misunderstood a colleague that said, "I'm drowing in work".
LevA532
0%
100%
LevA532,
User Rank: Apprentice
8/18/2019 | 10:02:45 AM
Lifeguard on Duty
Lifeguard: [ waving naval flags ] Slide back to the firewall! You are blocking the ports! Repeat! You are blocking the bubble ports!

[...]

Lifeguard: [ through bullhorn ] THE ENTIRE STAFF APPRECIATES YOUR COOPERATION!! THANK YOU SO MUCH!!
LauraA445
0%
100%
LauraA445,
User Rank: Apprentice
8/15/2019 | 5:04:48 PM
Re: New End Point Security
Everyone remain calm during software updates, sharks can smell vunerabilties !
PajamaSam
50%
50%
PajamaSam,
User Rank: Strategist
8/14/2019 | 3:54:51 PM
Name That Toon: Beat the Heat
Walk!
Eromeu
33%
67%
Eromeu,
User Rank: Apprentice
8/13/2019 | 1:25:21 PM
Cybersecurity Awareness
Guarantee: Our Cybersecurity Awareness messages will get to our end users!
Romteck
50%
50%
Romteck,
User Rank: Strategist
8/7/2019 | 8:55:32 PM
Caption Contest
Oh the lifeguard?
It was an unfortunate typo in a memo stating "We need someone to handle GDPR" was autocorrected to "We need someone to handle CPR".
On the upside, we have to wait for 30 minutes after lunch before being allowed back at our desks.
Romteck
33%
67%
Romteck,
User Rank: Strategist
8/7/2019 | 8:48:40 PM
Caption Contest
Hey you!
Yes, you. No Running ... as Admin. Save that for your own network at home.
clashe358
33%
67%
clashe358,
User Rank: Apprentice
8/7/2019 | 1:49:46 PM
The instructive guard
STROKE! STROKE!
ChildhoodMemory
25%
75%
ChildhoodMemory,
User Rank: Apprentice
8/2/2019 | 5:54:41 PM
Re: New Caption Contest!
Reminder: Wait one hour after eating before swimming in the VM Server Pool.
mcollins0092
33%
67%
mcollins0092,
User Rank: Apprentice
8/1/2019 | 2:04:22 PM
Name That Toon: Beat the Heat
When you apply for the Supervisor position, but you lied on your resume and you have no idea what you're doing.
Page 1 / 6   >   >>


Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35196
PUBLISHED: 2021-06-21
** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended fo...
CVE-2010-1433
PUBLISHED: 2021-06-21
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauth...
CVE-2010-1434
PUBLISHED: 2021-06-21
Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching further attacks. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulne...
CVE-2010-1435
PUBLISHED: 2021-06-21
Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the database through an already existing SQL injection vector. Joomla! Core versions 1.5.x ranging from 1.5...
CVE-2010-0413
PUBLISHED: 2021-06-21
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.