Threat Intelligence

4/26/2018
02:00 PM
John Klossner
John Klossner
Cartoon Contest
67%
33%

Name That Toon: Threat Landscape

We provide the cartoon. You provide the caption.
We provide the cartoon. You provide the caption.

Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. If you don't want to enter a caption, help us pick a winner by voting on the submissions. Click thumbs up for those you find funny; thumbs down, not so. As always, editorial comments are encouraged and welcomed.

Click here for contest rules. For advice on how to beat the competition, check out How To Win A Cartoon Caption Contest. The contest closes May 31.

 

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 9   >   >>
jpatterson300
100%
0%
jpatterson300,
User Rank: Apprentice
6/5/2018 | 1:45:25 PM
Acclimation
You can take the hacker out of Mom's basement...
JustSteve
50%
50%
JustSteve,
User Rank: Apprentice
6/1/2018 | 8:04:04 PM
Re: Time for a new caption contest!
Aren't the Russians coming?
martingail
0%
100%
martingail,
User Rank: Apprentice
6/1/2018 | 6:59:30 AM
Re: Reality
Hello there! I am newbie here.
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 10:50:18 PM
j029
"I'm stuck and can't do anything. Can you put in a support ticket for me?"
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/31/2018 | 10:48:48 PM
Re: j028
This probably hits close to home for a lot of people.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 10:48:03 PM
j028
"Duck and cover! Auditors at 3 o'clock!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 8:34:00 PM
j027
"Are you crazy? I'm not coming out until EVERYONE reboots their routers!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 8:30:51 PM
j026
"Mind your business! Surfing the dark web is supposed to be anonymous!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 8:28:43 PM
j025
"I'm just trying to hide from the security alerts for a while."
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
5/31/2018 | 3:34:30 PM
Caption: GDPR
"I know GDPR sounds scary Mark but hiding under your desk isn't going to make it go away!"
Page 1 / 9   >   >>
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6499
PUBLISHED: 2019-01-21
Teradata Viewpoint before 14.0 and 16.20.00.02-b80 contains a hardcoded password of TDv1i2e3w4 for the viewpoint database account (in viewpoint-portal\conf\server.xml) that could potentially be exploited by malicious users to compromise the affected system.
CVE-2019-6500
PUBLISHED: 2019-01-21
In Axway File Transfer Direct 2.7.1, an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request with %2e instead of '.' characters, as demonstrated by an initial /h2hdocumentation//%2e%2e/ substring.
CVE-2019-6498
PUBLISHED: 2019-01-21
GattLib 0.2 has a stack-based buffer over-read in gattlib_connect in dbus/gattlib.c because strncpy is misused.
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...