Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Threat Landscape
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 8 / 9   >   >>
Piyush1154
50%
50%
Piyush1154,
User Rank: Apprentice
5/1/2018 | 8:06:34 AM
Re: js012 - Block Chain explained in layman terms
Block Chain explained in layman terms — 

 

https://www.linkedin.com/pulse/block-chain-technology-piyush-jain/
Joe Stanganelli
33%
67%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:39:45 PM
js012
"What's blockchain?"
Joe Stanganelli
67%
33%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:37:14 PM
js011
"I live off the grid. It's how I survive reorgs."
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 5:35:54 PM
js010
"I asked for my own office, and this is what I got."
Joe Stanganelli
60%
40%
Joe Stanganelli,
User Rank: Ninja
4/30/2018 | 10:03:05 AM
js009
"Is it just me, or have the anti-phishing training modules gotten way more punitive?"
TP4MBH
0%
100%
TP4MBH,
User Rank: Apprentice
4/30/2018 | 9:44:30 AM
Re: Time for a new caption contest!
Can't do this with your rolly chairs and fancy desktops!
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 11:16:36 PM
js008
"Get out of there! The attacks are coming from 192.168.16.255!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:44:17 AM
js007
"Shhh! I'm the CISO. Don't tell anyone I'm here."
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:41:46 AM
js006
"Haven't you ever heard of layered security?"
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
4/29/2018 | 1:37:43 AM
js005
"Look, it's either this, or upgrade our endpoints."
<<   <   Page 8 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
CVE-2020-21547
PUBLISHED: 2021-09-17
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
CVE-2020-21548
PUBLISHED: 2021-09-17
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
CVE-2021-39218
PUBLISHED: 2021-09-17
Wasmtime is an open source runtime for WebAssembly &amp; WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger ...
CVE-2021-41387
PUBLISHED: 2021-09-17
seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.