Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cartoon Contest: Gong Show
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
matthewkmiller
matthewkmiller,
User Rank: Strategist
12/3/2020 | 11:45:17 AM
Broken Speaker
The speaker in my workstation stopped working. It's my new mail alert.
acampbell448
acampbell448,
User Rank: Ninja
12/1/2020 | 9:25:51 AM
Bing Watching?
I think the boss is bing watching '70s TV shows again!
dabeertender
dabeertender,
User Rank: Apprentice
11/30/2020 | 3:42:56 PM
Gong
We are really excited about our new two tone authentication system!
cstudent
cstudent,
User Rank: Apprentice
11/28/2020 | 3:04:45 PM
Caption Contest: Gong Show
I dozed off at my desk one time.
rwza01@gmail.com
[email protected],
User Rank: Apprentice
11/27/2020 | 12:47:43 AM
tamtam.chat
He's proving that the tamtam app is really available on any platform
Tempest2004
Tempest2004,
User Rank: Strategist
11/24/2020 | 10:14:22 PM
Gong
He hits the gong anytime he sees someone click on an email link.
pfharv@gmail.com
[email protected],
User Rank: Apprentice
11/24/2020 | 2:38:21 PM
Cartoon Rythym
« I said Clickety-click-click-Gong » not fyjqteeusurerkryo
northdmr
northdmr,
User Rank: Strategist
11/24/2020 | 10:50:10 AM
New Alert - Patch Tuesday
That's the CISO's new alert sound for Patch Tuesday upodates.  Let's get busy!
drmrs
drmrs,
User Rank: Strategist
11/19/2020 | 4:31:37 PM
Cartoon Contest: Gong Show
A GONG is as good as a cyber attack.
<<   <   Page 3 / 3


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-4170
PUBLISHED: 2022-12-09
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.
CVE-2022-4336
PUBLISHED: 2022-12-09
In BAOTA linux panel there exists a stored xss vulnerability attackers can use to obtain sensitive information via the log analysis feature.
CVE-2022-3259
PUBLISHED: 2022-12-09
Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks.
CVE-2022-3724
PUBLISHED: 2022-12-09
Crash in the USB HID protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file on Windows
CVE-2022-25629
PUBLISHED: 2022-12-09
An authenticated user who has the privilege to add/edit annotations on the Content tab, can craft a malicious annotation that can be executed on the annotations page (Annotation Text Column)