Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Disappearing Act
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 9   >   >>
Ace2010
Ace2010,
User Rank: Strategist
3/8/2018 | 12:11:16 PM
Caption Contest
Cyber thieves have found a new hole in the company's security to exploit
sljwampa
sljwampa,
User Rank: Apprentice
3/7/2018 | 1:01:30 PM
Caption Contest
Who phished him?
tiskinty
tiskinty,
User Rank: Apprentice
3/5/2018 | 1:17:37 PM
Caption Contest
"Well, there goes another cryptocurrency startup."
TT671
TT671,
User Rank: Strategist
3/5/2018 | 12:29:40 PM
Caption contest
Only 29 hours per week allowed?  That Affordable care act is tough.
Mrlauri
Mrlauri,
User Rank: Apprentice
3/5/2018 | 12:03:43 PM
caption
Hey, why they say that image heave emails are no longer supported?
oak2sfo
oak2sfo,
User Rank: Apprentice
3/3/2018 | 7:46:04 PM
Re: Caption
1. She was so concerned about the glass ceiling but didn't pay attention to the glass floor. 

2. Didn't we say creating a building with glass walls and floors was a bad idea - let that be a lesson not to "Think Different".
rdtwombly
rdtwombly,
User Rank: Apprentice
3/2/2018 | 12:05:16 PM
caption
I tried to tell him he was taking on too much.
acoutts
acoutts,
User Rank: Apprentice
3/2/2018 | 10:27:58 AM
GDPR
He's only exercising his Right to be Forgotten
muadhibs
muadhibs,
User Rank: Apprentice
3/2/2018 | 9:46:28 AM
Caption
Should we report a data leak now?
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
3/2/2018 | 4:34:21 AM
js17
"You may have flamed Bob to a crisp, but you're still wrong."
<<   <   Page 2 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1471
PUBLISHED: 2022-12-01
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
CVE-2022-3270
PUBLISHED: 2022-12-01
In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
CVE-2022-4221
PUBLISHED: 2022-12-01
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Asus NAS-M25 allows an unauthenticated attacker to inject arbitrary OS commands via unsanitized cookie values.This issue affects NAS-M25: through 1.0.1.7.
CVE-2022-45050
PUBLISHED: 2022-12-01
A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The title parameter on the twitter.php endpoint does not properly neutralise user input, resulting in the vulnerability.
CVE-2022-4246
PUBLISHED: 2022-12-01
A vulnerability classified as problematic has been found in Kakao PotPlayer. This affects an unknown part of the component MID File Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The ...