Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Name That Toon: Castle in the Sky
Oldest First  |  Newest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Strategist
10/19/2020 | 12:02:31 PM
Trojan Horse
Look, I know I made a mistake when I let in that horse but come on! They can't fit any soldiers into a phone.
User Rank: Strategist
10/20/2020 | 11:27:24 PM
Trojan Horse.
Our new big screen TV looks like it has arrived. It's not quite what I expected . . .
User Rank: Strategist
10/22/2020 | 6:51:48 AM
Trojan Horse.
Dunno Bob, looks phoney to me . . .
User Rank: Ninja
10/26/2020 | 2:14:00 PM
Does it melt?
Wonder what happens if we drop boiling hot oil on it?
User Rank: Strategist
10/26/2020 | 7:32:22 PM
I don't know about this. I think I smell a RAT!
User Rank: Apprentice
10/27/2020 | 2:10:20 PM
Dead trends
I don't care if it was a good prime day deal! Who needs that big of a phablet?!
User Rank: Strategist
10/27/2020 | 9:55:28 PM
It doesn't even look like a horse, what are you worried about.
User Rank: Strategist
10/27/2020 | 10:07:00 PM
Castle II
Arthur is old school, no personal devices inside the castle.  Doesn't matter if you found it on a Quest or not.
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-06-28
Admidio 4.1.2 version is affected by stored cross-site scripting (XSS).
PUBLISHED: 2022-06-28
Cleartext transmission of sensitive information vulnerability exists in STARDOM FCN Controller and FCJ Controller R1.01 to R4.31, which may allow an adjacent attacker to login the affected products and alter device configuration settings or tamper with device firmware.
PUBLISHED: 2022-06-28
Violation of secure design principles exists in the communication of CAMS for HIS. Affected products and versions are CENTUM series where LHS4800 is installed (CENTUM CS 3000 and CENTUM CS 3000 Small R3.08.10 to R3.09.00), CENTUM series where CAMS function is used (CENTUM VP, CENTUM VP Small, and CE...
PUBLISHED: 2022-06-28
Use of hard-coded credentials vulnerability exists in STARDOM FCN Controller and FCJ Controller R4.10 to R4.31, which may allow an attacker with an administrative privilege to read/change configuration settings or update the controller with tampered firmware.
PUBLISHED: 2022-06-28
An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikib...