MicroNet Systems Integrations

Category: Uncategorized

Trellix ESM Flaw Let Attackers Execute Arbitrary Commands

Trellix ESM Flaw Let Attackers Execute Arbitrary Commands

According to recent reports, there have been two serious vulnerabilities found in the Trellis SIEM. These vulnerabilities could potentially allow malicious actors to execute unauthorized commands within the Enterprise Security Manager (ESM) of Trellix. This poses a considerable risk to the security of the system and should be addressed promptly to prevent any potential breaches.

Read More
Critical Vulnerability in Stripe Payment Exposes Customer Data

Critical Vulnerability in Stripe Payment Exposes Customer Data

The WordPress Stripe Payment Gateway plugin has been vulnerable to Unauthenticated Insecure Direct Object Reference (IDOR) Vulnerability. WooCommerce developed this plugin. The plugin version is 7.4.1 and has nearly 900K installations worldwide. Usually, payments are redirected to externally hosted checkout pages where the checkout and payment process happens. The use of this plugin is to

Read More
Microsoft’s June 2023 Patch Tuesday – 38 Remote Code Execution Flaws Patched

Microsoft’s June 2023 Patch Tuesday – 38 Remote Code Execution Flaws Patched

Microsoft’s Patch Tuesday for June 2023 is here, bringing security updates for 78 problems, including 38 vulnerabilities that can be exploited remotely. Microsoft addressed 38 bugs that could allow remote code execution (RCE), and out of those, they classified only six flaws as ‘Critical.’ While all these six critical bugs encompass:- Denial of service attacks

Read More
What is the Difference Between Authentication vs Authorization?

What is the Difference Between Authentication vs Authorization?

Authentication and Authorization are two terms that are often used interchangeably in the tech world. However, both these terms are quite different with entirely different concepts and meanings. Authentication Simple English Meaning: The process or action of verifying the identity of a user or process. Authentication is the process of proving one’s identity before gaining

Read More