Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: WFH Summer 2020
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Wondergirl
67%
33%
Wondergirl,
User Rank: Apprentice
7/24/2020 | 2:38:04 PM
Name That Toon: WFH Summer 2020
"Hope this works, kids! The article said to put the virus in a sandbox!"
nschuetter
50%
50%
nschuetter,
User Rank: Apprentice
7/24/2020 | 12:02:58 PM
WFH Summer 2020
I've got a big project I'm almost done with, kids.  I'll shut the computer and come play with you once the tides have turned.
JoeAllDay
50%
50%
JoeAllDay,
User Rank: Apprentice
7/22/2020 | 12:27:17 PM
WFH Summer 2020
I know it's made of sand, but you just let me enjoy it for as long as possible?
Kaurik
50%
50%
Kaurik,
User Rank: Apprentice
7/22/2020 | 9:16:54 AM
Re: Write a caption & Win a prize!
I am the lord of my castle.
pmauriks
50%
50%
pmauriks,
User Rank: Strategist
7/22/2020 | 3:19:22 AM
WFH Summer 2020
Well, working from home doesn't mean ignoring physical security!
Deadsnott
67%
33%
Deadsnott,
User Rank: Strategist
7/20/2020 | 7:47:49 AM
Sandcastle environment
Dad, are you sure they didn't say open the app in a sand "box"?
pmauriks
50%
50%
pmauriks,
User Rank: Strategist
7/19/2020 | 7:57:00 PM
WFH Summer 2020
Defense in depth. Stuart makes sure to prevent shoulder surfing when working outside the office.
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
7/17/2020 | 10:42:48 AM
Write a caption & Win a prize!
Start your weekend with a smile! enter our new caption contest. 
<<   <   Page 2 / 2


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Hunny, I looked every where for the dorritos. 
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...