Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cartoon Contest: Second Wind
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
mongo8
50%
50%
mongo8,
User Rank: Apprentice
11/4/2019 | 11:21:42 AM
Bob
Quick...someone ask Bob about his trip to Comic-Con!
kratiw
0%
100%
kratiw,
User Rank: Strategist
10/31/2019 | 12:19:52 PM
Red Team Simulation
There's the Red Team again, tilting at windmills.
ianrod
0%
100%
ianrod,
User Rank: Strategist
10/28/2019 | 12:59:48 PM
Cloud's biggest fans
I guess managment really is all in on the cloud solution.  They are their biggest fans.
jevans1230
75%
25%
jevans1230,
User Rank: Strategist
10/16/2019 | 6:18:00 PM
Disaster Recovery
I've heard of using alternative power sources for Disaster Recovery but this is ridiculous. 
BCURTIS581
67%
33%
BCURTIS581,
User Rank: Apprentice
10/11/2019 | 1:48:01 PM
Mergers
Now that the merger of the cubicle farm with the wind farm is compelte I hear that there are plans to merge with the dairy farm.
mstrmac
0%
100%
mstrmac,
User Rank: Apprentice
10/10/2019 | 4:23:45 PM
Telework
I regret skimming over the telework agreement.
Hyznbrg
100%
0%
Hyznbrg,
User Rank: Strategist
10/10/2019 | 1:48:11 PM
Executive Suite
I believe they would be much more effective if installed in the executive suite
Tempest2004
0%
100%
Tempest2004,
User Rank: Strategist
10/5/2019 | 6:30:50 PM
Second Wind
They were installed to replace the backup generator, forgetting the windows don't open.
ddmclamb
0%
100%
ddmclamb,
User Rank: Apprentice
10/3/2019 | 3:30:15 PM
My feet
My feet are so tired. Wouldn't it be easier if we let the wind turn those things?
blightsey3921
0%
100%
blightsey3921,
User Rank: Strategist
10/3/2019 | 11:47:57 AM
buzzword buzz
Have you noticed that when the Boss comes around spouting the latest buzzwords we get a real voltage surge here ?
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10136
PUBLISHED: 2020-06-02
Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access cont...
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...
CVE-2020-13758
PUBLISHED: 2020-06-01
modules/security/classes/general.post_filter.php/post_filter.php in the Web Application Firewall in Bitrix24 through 20.0.950 allows XSS by placing %00 before the payload.
CVE-2020-9291
PUBLISHED: 2020-06-01
An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below may allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
CVE-2019-15709
PUBLISHED: 2020-06-01
An improper input validation in FortiAP-S/W2 6.2.0 to 6.2.2, 6.0.5 and below, FortiAP-U 6.0.1 and below CLI admin console may allow unauthorized administrators to overwrite system files via specially crafted tcpdump commands in the CLI.