Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: The Advanced Persistent Threat
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 5 / 7   >   >>
bearwilson
67%
33%
bearwilson,
User Rank: Apprentice
3/21/2019 | 12:25:10 PM
Name that Toom
Insider Threat Prevention activated!
beckyrX19
100%
0%
beckyrX19,
User Rank: Apprentice
3/21/2019 | 10:08:24 AM
Name That Toon: The Advanced Persistent Threat
"I told you to stay off the Dark Web..."
FKREITZBERG980
100%
0%
FKREITZBERG980,
User Rank: Moderator
3/20/2019 | 7:27:15 PM
squid
Looks like Jayne is having sushi for lunch again.
paul.dittrich
100%
0%
paul.dittrich,
User Rank: Strategist
3/19/2019 | 3:58:44 PM
Cartoon Caption
Reading Schneier's Friday Squid Blog again?
Yenrab
100%
0%
Yenrab,
User Rank: Strategist
3/19/2019 | 2:02:56 PM
Octopus
So, Mike, what kind of bait were you using when you went phishing?
Hack4GoodNotBad
50%
50%
Hack4GoodNotBad,
User Rank: Apprentice
3/18/2019 | 11:27:04 AM
Re: octopus
LOL 

Hope this one wins
FKREITZBERG980
100%
0%
FKREITZBERG980,
User Rank: Moderator
3/15/2019 | 5:58:23 PM
octopus
He knew that clicking on a link in an email put you at risk of viruses and worms but this was entirly unexpected.
mwalker871
50%
50%
mwalker871,
User Rank: Guru
3/15/2019 | 10:31:22 AM
Name That Toon: The Advanced Persistent Threat
Kraken be crackin'
gshrout
50%
50%
gshrout,
User Rank: Apprentice
3/14/2019 | 9:17:45 PM
Re: Caption
So, who is Cthulhu working for this week?
LeewardBear
50%
50%
LeewardBear,
User Rank: Strategist
3/14/2019 | 11:56:16 AM
'The Kraken'. I always wondered how they named viruses...
'The Kraken'. I always wondered how they named viruses...
<<   <   Page 5 / 7   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-40669
PUBLISHED: 2021-09-16
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords parameter under the coreframe/app/promote/admin/index.php file.
CVE-2021-40670
PUBLISHED: 2021-09-16
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords iparameter under the /coreframe/app/order/admin/card.php file.
CVE-2021-29763
PUBLISHED: 2021-09-16
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 under very specific conditions, could allow a local user to keep running a procedure that could cause the system to run out of memory.and cause a denial of service. IBM X-Force ID: 202267.
CVE-2021-29825
PUBLISHED: 2021-09-16
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) could disclose sensitive information when using ADMIN_CMD with LOAD or BACKUP. IBM X-Force ID: 204470.
CVE-2021-29842
PUBLISHED: 2021-09-16
IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0 and Liberty 17.0.0.3 through 21.0.0.9 could allow a remote user to enumerate usernames due to a difference of responses from valid and invalid login attempts. IBM X-Force ID: 205202.