Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 10 / 13   >   >>
aguilar
0%
100%
aguilar,
User Rank: Apprentice
5/19/2017 | 3:23:04 AM
Name that Toon
Ey guys! We got another horned phising campaign!
Argentus
0%
100%
Argentus,
User Rank: Apprentice
5/18/2017 | 4:32:11 PM
Name That Toon: Screen Sharing
"...it also uses a 100 000bit private key and utilizes one-time pad encryption..."
Deckerch
100%
0%
Deckerch,
User Rank: Apprentice
5/18/2017 | 12:30:55 PM
Name That Toon: Screen Sharing
Hey Janice, is this supposed to part of the new Multi-Factor Authentication?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/18/2017 | 8:39:04 AM
ntt3
"I should never have crossed the Godfather of Silicon Valley."
brownhat
100%
0%
brownhat,
User Rank: Apprentice
5/16/2017 | 3:10:50 PM
Re: Name That Toon: Screen Sharing
*double-click* Ummm, Linda? I think I just opened a backdoor to Narnia!
TonyD71
0%
100%
TonyD71,
User Rank: Apprentice
5/16/2017 | 9:42:01 AM
Re: CARTOON CONTEST
No the Ransomware payment is in Bitcoin not Unicorn!
JasonKontach
100%
0%
JasonKontach,
User Rank: Apprentice
5/15/2017 | 6:16:32 PM
It was Google Autocorrect!
I typed unix cron window! I swear!
JoeC57
100%
0%
JoeC57,
User Rank: Apprentice
5/15/2017 | 5:29:28 PM
Re: CARTOON CONTEST
Not another new version of a Trojan horse!
zlatka
100%
0%
zlatka,
User Rank: Strategist
5/15/2017 | 1:32:19 PM
Re: Not Java?
"these new 3d monitors make the picture really pop out at you!"
ebanksto
100%
0%
ebanksto,
User Rank: Apprentice
5/15/2017 | 12:22:46 PM
Caption Contest
I can clearly see your point.
<<   <   Page 10 / 13   >   >>


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28973
PUBLISHED: 2021-04-13
The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
CVE-2021-29997
PUBLISHED: 2021-04-13
XML External Entity Resolution (XXE) in Helix ALM. The XML Import functionality of the Administration console in Perforce Helix ALM 2020.3.1 Build 22 accepts XML input data that is parsed by insecurely configured software components, leading to XXE attacks.
CVE-2021-29998
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.
CVE-2021-29999
PUBLISHED: 2021-04-13
An issue was discovered in Wind River VxWorks through 6.8. There is a possible stack overflow in dhcp server.
CVE-2021-21729
PUBLISHED: 2021-04-13
Some ZTE products have CSRF vulnerability. Because some pages lack CSRF random value verification, attackers could perform illegal authorization operations by constructing messages.This affects: ZXHN H168N V3.5.0_EG1T5_TE, V2.5.5, ZXHN H108N V2.5.5_BTMT1