Comments
Name That Toon: Disappearing Act
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 9   >   >>
Ace2010
100%
0%
Ace2010,
User Rank: Apprentice
3/8/2018 | 12:11:16 PM
Caption Contest
Cyber thieves have found a new hole in the company's security to exploit
sljwampa
0%
100%
sljwampa,
User Rank: Apprentice
3/7/2018 | 1:01:30 PM
Caption Contest
Who phished him?
tiskinty
0%
100%
tiskinty,
User Rank: Apprentice
3/5/2018 | 1:17:37 PM
Caption Contest
"Well, there goes another cryptocurrency startup."
TT671
0%
100%
TT671,
User Rank: Apprentice
3/5/2018 | 12:29:40 PM
Caption contest
Only 29 hours per week allowed?  That Affordable care act is tough.
Mrlauri
50%
50%
Mrlauri,
User Rank: Apprentice
3/5/2018 | 12:03:43 PM
caption
Hey, why they say that image heave emails are no longer supported?
oak2sfo
67%
33%
oak2sfo,
User Rank: Apprentice
3/3/2018 | 7:46:04 PM
Re: Caption
1. She was so concerned about the glass ceiling but didn't pay attention to the glass floor. 

2. Didn't we say creating a building with glass walls and floors was a bad idea - let that be a lesson not to "Think Different".
rdtwombly
50%
50%
rdtwombly,
User Rank: Apprentice
3/2/2018 | 12:05:16 PM
caption
I tried to tell him he was taking on too much.
acoutts
33%
67%
acoutts,
User Rank: Apprentice
3/2/2018 | 10:27:58 AM
GDPR
He's only exercising his Right to be Forgotten
muadhibs
100%
0%
muadhibs,
User Rank: Apprentice
3/2/2018 | 9:46:28 AM
Caption
Should we report a data leak now?
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/2/2018 | 4:34:21 AM
js17
"You may have flamed Bob to a crisp, but you're still wrong."
<<   <   Page 2 / 9   >   >>


Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10617
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application t...
CVE-2018-10621
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application ...
CVE-2018-10623
PUBLISHED: 2018-06-18
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote co...
CVE-2015-4664
PUBLISHED: 2018-06-18
An improper input validation vulnerability in CA Privileged Access Manager 2.4.4.4 and earlier allows remote attackers to execute arbitrary commands.
CVE-2018-9021
PUBLISHED: 2018-06-18
An authentication bypass vulnerability in CA Privileged Access Manager 2.8.2 and earlier allows remote attackers to execute arbitrary commands with specially crafted requests.