Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Write A Caption & Win A Prize
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 13 / 14   >   >>
ho3w
ho3w,
User Rank: Apprentice
2/15/2016 | 1:13:11 PM
Caption
Boss, hiding in plain sight has proven to be more successful than anticipated.
clone13
clone13,
User Rank: Strategist
2/15/2016 | 11:08:44 AM
HR sent me..
HR sent me to talk to you about the company's clean desk policy...
SHOLLERAN300
SHOLLERAN300,
User Rank: Apprentice
2/15/2016 | 10:47:40 AM
The Blind Leading the Blind
"I don't know how you do it, George! I just do ABC123 to remember mine."
bradmathis
bradmathis,
User Rank: Apprentice
2/15/2016 | 10:25:50 AM
Boss, I think you misunderstood!
Hey Boss.  When I told you to consider a cloud based password management system, this is NOT what I meant. #moremoneythansense
ecote068
ecote068,
User Rank: Strategist
2/15/2016 | 9:59:35 AM
Write a Caption
Well, we have tremendously decreased the time to reset a user's password!  Now we have to work on limiting who gets to see it.
Whoopty
Whoopty,
User Rank: Ninja
2/15/2016 | 7:47:34 AM
Well
"I have a fool proof way of remembering mine. No-one will ever catch on."
MarkN684
MarkN684,
User Rank: Apprentice
2/14/2016 | 1:35:28 AM
Caption
The latest security upgrade to the OPM site
dale_stout
dale_stout,
User Rank: Strategist
2/13/2016 | 10:40:07 PM
Write a Caption
You'd better get your boarding pass.
dale_stout
dale_stout,
User Rank: Strategist
2/13/2016 | 10:40:07 PM
Write a Caption
You'd better get your boarding pass.
hewenthatway
hewenthatway,
User Rank: Strategist
2/13/2016 | 7:28:34 PM
caption
Well, as you can see, we've been pwned.
<<   <   Page 13 / 14   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4264
PUBLISHED: 2022-12-09
Incorrect Privilege Assignment in M-Files Web (Classic) in M-Files before 22.8.11691.0 allows low privilege user to change some configuration.
CVE-2022-44213
PUBLISHED: 2022-12-09
ZKTeco Xiamen Information Technology ZKBio ECO ADMS &lt;=3.1-164 is vulnerable to Cross Site Scripting (XSS).
CVE-2022-2752
PUBLISHED: 2022-12-09
A vulnerability in the web server of Secomea GateManager allows a local user to impersonate as the previous user under some failed login conditions. This issue affects: Secomea GateManager versions from 9.4 through 9.7.
CVE-2022-4377
PUBLISHED: 2022-12-09
A vulnerability was found in S-CMS 5.0 Build 20220328. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Contact Information Page. The manipulation of the argument Make a Call leads to cross site scripting. The attack can be launched rem...
CVE-2022-4375
PUBLISHED: 2022-12-09
A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed t...