Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Cartoon: Luck O' The Irish
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 11   >   >>
Kristin Burnham
Kristin Burnham,
User Rank: Apprentice
3/7/2014 | 4:01:23 PM
Re: When did we move to Bit-coin vs our normal pot of gold?
^^Ha, a very timely caption.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:18:23 PM
Thinking ahead
What do we do if the batteries die?
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:17:59 PM
Share the wealth
Maybe this will keep them from taking the whole pot.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:17:17 PM
Sidetracked
What better way to hide the gold, than with distractions.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:16:51 PM
Conundrum
Now how in the world are we going to hide these things with all those GPS locator chips.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:16:23 PM
At the end of the Rainbow.
Won't Finian be surprised.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:15:54 PM
Color Coordination
Matching the colors of the rainbow is a nice touch.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:15:00 PM
Transport Assist
At least it will be a lot lighter.
dw_ship
dw_ship,
User Rank: Apprentice
3/7/2014 | 3:14:27 PM
Hidden Gold
The real gold is in the contracts for these yokes.
CotopaxiRon
CotopaxiRon,
User Rank: Apprentice
3/7/2014 | 2:37:26 PM
The Real Treasure!
"The real treasure is that they all have Flappy Bird preinstalled!"
<<   <   Page 4 / 11   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2993
PUBLISHED: 2022-12-09
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
CVE-2022-4390
PUBLISHED: 2022-12-09
A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do...
CVE-2022-45290
PUBLISHED: 2022-12-09
Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java.
CVE-2022-41299
PUBLISHED: 2022-12-09
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID...
CVE-2022-4170
PUBLISHED: 2022-12-09
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.