Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: Winter Forecast
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Dave9000
Dave9000,
User Rank: Apprentice
1/4/2021 | 9:16:06 AM
IT Fix
IT's Solution to Global Warming and Covid-19
acampbell448
acampbell448,
User Rank: Ninja
1/4/2021 | 9:02:28 AM
Our own bubble
They keep saying that we all need to stay in our own bubble to be safe but this is a little ridiculous!
Ace2010
Ace2010,
User Rank: Strategist
12/23/2020 | 2:11:23 PM
Shovel your space
The only real issue I have with this, is having to shovel my workspace before I can log in...
Ace2010
Ace2010,
User Rank: Strategist
12/23/2020 | 2:07:49 PM
Yellow snow
Since these are not assigned workstations, make sure you watch for "yellow" snow before you start working.
Ace2010
Ace2010,
User Rank: Strategist
12/23/2020 | 2:06:04 PM
Trapped?
Not sure if management is trying to protect us or keep us trapped here until our project is done.
Ace2010
Ace2010,
User Rank: Strategist
12/21/2020 | 11:51:10 AM
Tropical Globe
I know the company is trying to keep us "socially distant" but couldn't they have picked a Carribean "snow globe" to do so?
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 4:29:32 PM
Global Pandemic
I think management misunderstood what "Global" in "global pandemic" meant!
Ace2010
Ace2010,
User Rank: Strategist
12/18/2020 | 3:24:54 PM
Don't shake things up
I'm all for social distancing in the office, but let's hope management doesn't try to SHAKE things up even more!
GWAIN
GWAIN,
User Rank: Strategist
12/17/2020 | 7:39:44 PM
Global Training
This year's training on the socially distanced, globe-al workforce with real-world application.
DavidT30303
DavidT30303,
User Rank: Strategist
12/17/2020 | 8:48:33 AM
Social Distancing in the workplace continues into 2021
Music NotesWorking in a Winter Wonderland Music Notes
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30016
PUBLISHED: 2022-05-23
Rescue Dispatch Management System 1.0 is vulnerable to Incorrect Access Control via http://localhost/rdms/admin/?page=system_info.
CVE-2022-30017
PUBLISHED: 2022-05-23
Rescue Dispatch Management System 1.0 suffers from Stored XSS, leading to admin account takeover via cookie stealing.
CVE-2022-28932
PUBLISHED: 2022-05-23
D-Link DSL-G2452DG HW:T1\\tFW:ME_2.00 was discovered to contain insecure permissions.
CVE-2022-29004
PUBLISHED: 2022-05-23
Diary Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name parameter in search-result.php.
CVE-2022-29005
PUBLISHED: 2022-05-23
Multiple cross-site scripting (XSS) vulnerabilities in the component /obcs/user/profile.php of Online Birth Certificate System v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname or lname parameters.