Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: End User Lockdown
Newest First  |  Oldest First  |  Threaded View
Page 1 / 6   >   >>
syekim13
100%
0%
syekim13,
User Rank: Strategist
6/6/2019 | 11:12:59 AM
Job Security
Job Security
Koalaking
50%
50%
Koalaking,
User Rank: Strategist
6/6/2019 | 11:10:42 AM
New Person
The new person the hired has gone a bit too far....
rfarnl
50%
50%
rfarnl,
User Rank: Strategist
6/6/2019 | 9:39:57 AM
My request for a day off has been denied
My request for a day off was denied
tharmsen
50%
50%
tharmsen,
User Rank: Apprentice
6/5/2019 | 3:56:32 AM
Privileged Account Management
Our security team are taking accountability a bit far?
mroberts1161
100%
0%
mroberts1161,
User Rank: Strategist
6/3/2019 | 10:09:34 AM
Name That Toon: End User Lockdown
Audit day? What gave it away?
Kristendean80
50%
50%
Kristendean80,
User Rank: Strategist
6/3/2019 | 9:22:50 AM
Locked out
I dont always type my password wrong, but when I do, I make sure to repeat it until Im locked out!
acampbell448
50%
50%
acampbell448,
User Rank: Strategist
5/30/2019 | 9:23:43 AM
Pentest coming!
I think we are ready now for the pentesters to come on site!
isolovey
50%
50%
isolovey,
User Rank: Apprentice
5/29/2019 | 3:09:30 PM
Cartoon Caption: PadLock
Ransomware is getting out of control
rootbid
50%
50%
rootbid,
User Rank: Apprentice
5/28/2019 | 1:54:05 PM
Solidity
Client-side security.
Blaze007
100%
0%
Blaze007,
User Rank: Strategist
5/28/2019 | 1:34:19 PM
Security Posture
"So this is what those Security folk mean when they talk about improving our security posture! I gotta hand it to them, I've never had better neck support!"
Page 1 / 6   >   >>


Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...