Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Gather 'Round the Campfire
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 4
semitad
0%
100%
semitad,
User Rank: Strategist
2/17/2021 | 3:54:36 PM
Name That Toon Caption
He's ordering some cast iron pots online. They'll be here in two hours and we can start cooking.
cyberinsane
100%
0%
cyberinsane,
User Rank: Strategist
2/17/2021 | 10:19:15 AM
Early Social Media
Says he's sending digital smoke signals ... hmph, it'll never catch on.
blightsey3921
100%
0%
blightsey3921,
User Rank: Strategist
2/16/2021 | 3:58:28 PM
fire-n-rocks
I'm pretty sure that he's supposed to be using Firefox - not "fire-n-rocks"

 
mmillslagel85001
0%
100%
mmillslagel85001,
User Rank: Guru
2/16/2021 | 10:43:31 AM
campfire
That's a great drum.
n0str4d4
0%
100%
n0str4d4,
User Rank: Apprentice
2/16/2021 | 10:31:59 AM
Gather 'Round the Campfire'
Just in case we forgot how to do this all over again...
PeterA9876
50%
50%
PeterA9876,
User Rank: Apprentice
2/16/2021 | 9:24:35 AM
Gather 'Round the Campfire comment--why not?
This comment is waiting for review by our moderators.
surrat
100%
0%
surrat,
User Rank: Apprentice
2/16/2021 | 8:29:10 AM
Gather 'Round the Campfire
I thought he said to build a fire and wall.
Deadsnott
100%
0%
Deadsnott,
User Rank: Strategist
2/16/2021 | 3:59:06 AM
Next on the list
Hey, now Google how to make a wheel?
O'
0%
100%
O',
User Rank: Apprentice
2/15/2021 | 5:06:57 PM
Round The Campfire Toon
Hey guys, I found a couple of CVE's for that spear and for the flint rocks.  You will want to patch both ASAP.
<<   <   Page 4 / 4


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's &quot;extractArchive&quot; function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.