Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: End User Lockdown
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 6   >   >>
BillyTequila
17%
83%
BillyTequila,
User Rank: Apprentice
5/16/2019 | 12:00:46 PM
Name that toon
We need an updated  Remote Access Policy! 
abbyross
44%
56%
abbyross,
User Rank: Strategist
5/16/2019 | 11:57:59 AM
Name that Toon
"I better tell my wife I won't be home for dinner."

"I told mine I was going phishing."
lunny
29%
71%
lunny,
User Rank: Strategist
5/16/2019 | 10:54:02 AM
Phishing
I failed 472 Phishing simulations.  You?
DnsBeastMode
29%
71%
DnsBeastMode,
User Rank: Apprentice
5/15/2019 | 9:36:55 PM
Well then...
"I see they pushed out a new group policy..."
tedelblute
0%
100%
tedelblute,
User Rank: Strategist
5/15/2019 | 8:07:51 PM
Lockdown
These system lockdowns are begining to weigh heavily on me.
Hyznbrg
11%
89%
Hyznbrg,
User Rank: Strategist
5/14/2019 | 5:13:04 PM
CRM
Maybe we should try the WIFI to get to our CRM!
rafaelr123
55%
45%
rafaelr123,
User Rank: Strategist
5/14/2019 | 4:52:32 PM
Toon
Did you click on that link I sent you?

Yep...
Kristendean80
22%
78%
Kristendean80,
User Rank: Strategist
5/14/2019 | 10:38:44 AM
PEBKAC Error
PEBKAC error has occurred. Problem Exist Between Keyboard And Chair
lakers85
44%
56%
lakers85,
User Rank: Strategist
5/14/2019 | 9:52:45 AM
Best Practices?
Do you think this is what they meant when they talked about 'user lockdown' during the Active Directory Security & Best Practices seminar the other day?
matt025
40%
60%
matt025,
User Rank: Strategist
5/13/2019 | 9:57:22 AM
Locky strikes again!
I told you the Locky ransomware was still in circulation, but you just had to try the link anyway!!!.....
<<   <   Page 4 / 6   >   >>


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16961
PUBLISHED: 2021-01-15
SolarWinds Web Help Desk 12.7.0 allows XSS via a Schedule Name.
CVE-2020-35733
PUBLISHED: 2021-01-15
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
CVE-2021-23836
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
CVE-2021-23837
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
CVE-2021-23838
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...