According to recent reports, there have been two serious vulnerabilities found in the Trellis SIEM. These vulnerabilities could potentially allow malicious actors to execute unauthorized commands within the Enterprise Security Manager (ESM) of Trellix. This poses a considerable risk to the security of the system and should be addressed promptly to prevent any potential breaches.
Read MoreThe WordPress Stripe Payment Gateway plugin has been vulnerable to Unauthenticated Insecure Direct Object Reference (IDOR) Vulnerability. WooCommerce developed this plugin. The plugin version is 7.4.1 and has nearly 900K installations worldwide. Usually, payments are redirected to externally hosted checkout pages where the checkout and payment process happens. The use of this plugin is to
Read MoreMicrosoft’s Patch Tuesday for June 2023 is here, bringing security updates for 78 problems, including 38 vulnerabilities that can be exploited remotely. Microsoft addressed 38 bugs that could allow remote code execution (RCE), and out of those, they classified only six flaws as ‘Critical.’ While all these six critical bugs encompass:- Denial of service attacks
Read MoreAuthentication and Authorization are two terms that are often used interchangeably in the tech world. However, both these terms are quite different with entirely different concepts and meanings. Authentication Simple English Meaning: The process or action of verifying the identity of a user or process. Authentication is the process of proving one’s identity before gaining
Read More