Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 5 / 13   >   >>
infolinity
infolinity,
User Rank: Apprentice
8/21/2017 | 5:19:16 PM
Name That Toon: Screen Sharing
See? I'm a Unicorn in the making! It's about time you accepted my request for a date...
Je6
Je6,
User Rank: Strategist
8/11/2017 | 6:39:29 AM
Screen Sharing
No, no, no! Have a Unix CRON do the pop-up reminders!
ChaseL123
ChaseL123,
User Rank: Strategist
8/9/2017 | 1:09:27 PM
comment
These pop ups are getting more annoying every year
GonzSTL
GonzSTL,
User Rank: Ninja
8/8/2017 | 8:10:00 AM
Caption
I need to talk to Alice about those meds she gave me this morning.
Horsedancer
Horsedancer,
User Rank: Apprentice
8/7/2017 | 5:06:34 PM
Better Quote
When Dave's autocorrect set the output filter to Unicorn instead of Unicode, things took a strange turn.
tbe33
tbe33,
User Rank: Apprentice
8/4/2017 | 10:24:02 AM
Cartoon Caption
Amazon's new delivery service really is fast!
stevejennings
stevejennings,
User Rank: Strategist
8/2/2017 | 4:19:35 PM
Screen Sharing
"Windows 10 Paint 3D is awesome!"
BadReynolds
BadReynolds,
User Rank: Apprentice
8/1/2017 | 3:42:17 PM
Witcher
Hey Mary, you ever heard of a game called the Witcher 3? I stumbled across some fan films, this one's even in 3D! Oh god! What are they going to do on top of it?
saak
saak,
User Rank: Apprentice
7/27/2017 | 6:55:40 PM
darn Unicorn
"Jamie, the darn Unicorn is back."
criddel
criddel,
User Rank: Apprentice
7/25/2017 | 1:25:59 PM
Caption
" I think Google Doodle is getting a little out of control"
<<   <   Page 5 / 13   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-22455
PUBLISHED: 2022-08-17
IBM Security Verify Governance Identity Manager 10.0 virtual appliance component performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 224989.
CVE-2022-36191
PUBLISHED: 2022-08-17
A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242.
CVE-2022-30262
PUBLISHED: 2022-08-17
The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no a...
CVE-2022-31262
PUBLISHED: 2022-08-17
An exploitable local privilege escalation vulnerability exists in GOG Galaxy 2.0.46. Due to insufficient folder permissions, an attacker can hijack the %ProgramData%\GOG.com folder structure and change the GalaxyCommunication service executable to a malicious file, resulting in code execution as SYS...
CVE-2022-36186
PUBLISHED: 2022-08-17
A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.