Comments
Name That Toon: Screen Sharing
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 13   >   >>
ANON1248968898543
100%
0%
ANON1248968898543,
User Rank: Strategist
10/6/2017 | 11:11:43 AM
Caption
What was in those brownies?
jayharp
100%
0%
jayharp,
User Rank: Apprentice
10/4/2017 | 6:01:20 PM
caption
"These erectile dysfunction ads are really getting intrusive."
falconitservices
100%
0%
falconitservices,
User Rank: Apprentice
10/2/2017 | 9:41:29 PM
I just receive an email formatted in Unicorn
I just receive an email formatted in Unicorn
cvbob3789
100%
0%
cvbob3789,
User Rank: Apprentice
9/30/2017 | 12:15:33 PM
Cartoon caption
Lisa, check out this new 3-D monitor!
-odjbo-
100%
0%
-odjbo-,
User Rank: Apprentice
9/29/2017 | 10:41:59 PM
Cartoon Caption
Nice upgrade... Ctrl-U doesn't underline anymore.
PhishClickRepeat
100%
0%
PhishClickRepeat,
User Rank: Apprentice
9/29/2017 | 12:43:43 PM
Why Organizations Fail
Bob: "GOT IT!"

Anne: "Got what?"

Bob: "That unicorn the CIO keeps saying we'll never catch"

Anne: "I don't think she...."

Bob: "All our security problems are solved!"
DevilOps
100%
0%
DevilOps,
User Rank: Apprentice
9/29/2017 | 12:08:37 PM
Ops spun up the wrong VM...
Ops must have a new employee...I asked for a VM with nginx and gunicorn and look what I got!
moberdacker152
100%
0%
moberdacker152,
User Rank: Strategist
9/28/2017 | 1:07:36 PM
Cartoon Caption
Jane, Do you see this?  I swear, all I did was log on.  I didn't click anything--this time.
21Ladders
50%
50%
21Ladders,
User Rank: Apprentice
9/28/2017 | 12:01:43 PM
Hang on folks - looks like the critical outage just "fixed itself". Just 10 min before we failed SLA too
Hang on folks - looks like the critical outage just "fixed itself". Just 10 min before we failed SLA too
m0lotov
100%
0%
m0lotov,
User Rank: Strategist
9/25/2017 | 2:14:12 PM
Name That Toon: Screen Sharing
"I thought that Windows error sounded horsey."
<<   <   Page 2 / 13   >   >>


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2018-5067
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5068
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2018-5069
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.