Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Threat Landscape
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 8 / 9   >   >>
Piyush1154
50%
50%
Piyush1154,
User Rank: Apprentice
5/1/2018 | 8:06:34 AM
Re: js012 - Block Chain explained in layman terms
Block Chain explained in layman terms — 

 

https://www.linkedin.com/pulse/block-chain-technology-piyush-jain/
Joe Stanganelli
33%
67%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:39:45 PM
js012
"What's blockchain?"
Joe Stanganelli
67%
33%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:37:14 PM
js011
"I live off the grid. It's how I survive reorgs."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:35:54 PM
js010
"I asked for my own office, and this is what I got."
Joe Stanganelli
60%
40%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 10:03:05 AM
js009
"Is it just me, or have the anti-phishing training modules gotten way more punitive?"
TP4MBH
0%
100%
TP4MBH,
User Rank: Apprentice
4/30/2018 | 9:44:30 AM
Re: Time for a new caption contest!
Can't do this with your rolly chairs and fancy desktops!
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 11:16:36 PM
js008
"Get out of there! The attacks are coming from 192.168.16.255!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:44:17 AM
js007
"Shhh! I'm the CISO. Don't tell anyone I'm here."
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:41:46 AM
js006
"Haven't you ever heard of layered security?"
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:37:43 AM
js005
"Look, it's either this, or upgrade our endpoints."
<<   <   Page 8 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20120
PUBLISHED: 2021-09-28
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the &quot;where&quot; and &quot;query&quot; methods.
CVE-2020-20122
PUBLISHED: 2021-09-28
Wuzhi CMS v4.1 contains a SQL injection vulnerability in the checktitle() function in /coreframe/app/content/admin/content.php.
CVE-2020-20124
PUBLISHED: 2021-09-28
Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.
CVE-2020-20125
PUBLISHED: 2021-09-28
EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.
CVE-2021-41106
PUBLISHED: 2021-09-28
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as h...