Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: The Advanced Persistent Threat
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 7   >   >>
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:28:14 AM
js0308
"It's one thing for them to steal our jobs. It's another to have to train them before getting fired."
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:26:33 AM
js0307
"You really need to clear out your ticket queue."
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:24:28 AM
js0306
"On the one hand, he's got over a dozen security certifications, he knows more than 40 progamming languages, and he can read hexadecimal. On the other hand, he's a giant monster who's going to eat us."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:13:54 AM
js0305
"Did you meet the new guy yet?"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:12:05 AM
js0304
"Told you not to feed the trolls."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:10:47 AM
js0303
"Dude. Get off of Facebook."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/29/2019 | 12:09:51 AM
js0302
"Yeah, it does that sometimes."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
3/28/2019 | 11:20:42 PM
js0301
"Ph'nglui mglw'nafh TLS R'lyeh wgah'nagl fhtagn."
willgetin
0%
100%
willgetin,
User Rank: Guru
3/27/2019 | 4:39:18 PM
Updating the crawler
When development said they were updating the web crawler with some new features, they weren't kidding around!
JohnS78602
0%
100%
JohnS78602,
User Rank: Apprentice
3/27/2019 | 10:18:22 AM
Tentalcles
Now that's a phishing attack...  with tentacles!
<<   <   Page 3 / 7   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's &quot;extractArchive&quot; function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.