Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Threat Landscape
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 9   >   >>
bbeyst
100%
0%
bbeyst,
User Rank: Strategist
5/25/2018 | 2:28:43 PM
Cartoon contenst
Despite Bob's best efforts, the phishing emails still found him.
julrichWest
50%
50%
julrichWest,
User Rank: Apprentice
5/25/2018 | 2:12:49 PM
Caption
Caption:
I need more protection than my aluminum foil hat provides!
elitet3ch
100%
0%
elitet3ch,
User Rank: Strategist
5/24/2018 | 12:20:22 AM
Re: Time for a new caption contest!
Shhh!  They're watching...

And you have a laptop?

 
Abujamra
50%
50%
Abujamra,
User Rank: Apprentice
5/22/2018 | 1:28:38 PM
DARK READING CARTOON CAPTION CONTEST
"The one you have not seen, won't be remembered".
bgeisler913
100%
0%
bgeisler913,
User Rank: Strategist
5/22/2018 | 1:07:01 PM
When management no longer allows telecommuting.
 

 

Don't mind Sam he is adjusting to being back in the office after telecommuting for so long.
J.Carson
50%
50%
J.Carson,
User Rank: Apprentice
5/22/2018 | 11:19:33 AM
Paranoid??
Who's a little paranoid?? 
mehrdad.nourani@kcmo.org
50%
50%
[email protected],
User Rank: Apprentice
5/22/2018 | 9:50:07 AM
Time for a new caption contest!
Get me if you can! I'm air gapped.
clnieto
100%
0%
clnieto,
User Rank: Apprentice
5/22/2018 | 4:20:21 AM
Cartoon Contest
Typin' in my password. Somebody's shoulder surfin'. Woooh!
lazyjones
100%
0%
lazyjones,
User Rank: Strategist
5/19/2018 | 6:18:52 AM
Caption
"Security through obscurity"
MintyFresh668
50%
50%
MintyFresh668,
User Rank: Apprentice
5/16/2018 | 7:05:59 AM
Bob, a Facebook ad manager, was paranoid about the Russians 'cleaning up' any links...
Bob, a Facebook ad manager, was paranoid about the Russians 'cleaning up' any links...
<<   <   Page 3 / 9   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/&lt;id&gt;.html allows authenticated attackers to delete all users.
CVE-2016-6555
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...
CVE-2016-6556
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This iss...