Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: The Advanced Persistent Threat
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 5 / 7   >   >>
bearwilson
bearwilson,
User Rank: Apprentice
3/21/2019 | 12:25:10 PM
Name that Toom
Insider Threat Prevention activated!
beckyrX19
beckyrX19,
User Rank: Apprentice
3/21/2019 | 10:08:24 AM
Name That Toon: The Advanced Persistent Threat
"I told you to stay off the Dark Web..."
FKREITZBERG980
FKREITZBERG980,
User Rank: Moderator
3/20/2019 | 7:27:15 PM
squid
Looks like Jayne is having sushi for lunch again.
paul.dittrich
paul.dittrich,
User Rank: Strategist
3/19/2019 | 3:58:44 PM
Cartoon Caption
Reading Schneier's Friday Squid Blog again?
Yenrab
Yenrab,
User Rank: Strategist
3/19/2019 | 2:02:56 PM
Octopus
So, Mike, what kind of bait were you using when you went phishing?
Hack4GoodNotBad
Hack4GoodNotBad,
User Rank: Apprentice
3/18/2019 | 11:27:04 AM
Re: octopus
LOL 

Hope this one wins
FKREITZBERG980
FKREITZBERG980,
User Rank: Moderator
3/15/2019 | 5:58:23 PM
octopus
He knew that clicking on a link in an email put you at risk of viruses and worms but this was entirly unexpected.
mwalker871
mwalker871,
User Rank: Guru
3/15/2019 | 10:31:22 AM
Name That Toon: The Advanced Persistent Threat
Kraken be crackin'
gshrout
gshrout,
User Rank: Apprentice
3/14/2019 | 9:17:45 PM
Re: Caption
So, who is Cthulhu working for this week?
LeewardBear
LeewardBear,
User Rank: Strategist
3/14/2019 | 11:56:16 AM
'The Kraken'. I always wondered how they named viruses...
'The Kraken'. I always wondered how they named viruses...
<<   <   Page 5 / 7   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2993
PUBLISHED: 2022-12-09
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
CVE-2022-4390
PUBLISHED: 2022-12-09
A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do...
CVE-2022-45290
PUBLISHED: 2022-12-09
Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java.
CVE-2022-41299
PUBLISHED: 2022-12-09
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID...
CVE-2022-4170
PUBLISHED: 2022-12-09
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.