Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the…
Browsing CategorySAP
Boost SAP Security With Zero Trust
How can your organization improve its Systems Applications and Products (SAP) risk posture? Aligning with the key principles of zero trust through tangible and specific measures is one way. To…
Hackers Massively Scanning for SAP Recon Vulnerability
Last Week SAP releases updates to fix critical security vulnerability found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to 7.50. The vulnerability can be tracked as CVE-2020-6287 and it is rated with a maximum CVSS score of 10 out of 10. The RECON vulnerability (short for Remotely Exploitable Code On NetWeaver) […]
The post Hackers Massively Scanning for SAP Recon Vulnerability appeared first on GBHackers On Security.
Critical SAP Recon Vulnerability Affecting Over 40,000 Customers
SAP released updates for critical security vulnerability found in the SAP NetWeaver AS JAVA (LM Configuration Wizard) versions 7.30 to 7.50. The vulnerability can be tracked as CVE-2020-6287 and it is rated with a maximum CVSS score of 10 out of 10. The RECON (short for Remotely Exploitable Code On NetWeaver) was found by Onapsis […]
The post Critical SAP Recon Vulnerability Affecting Over 40,000 Customers appeared first on GBHackers On Security.
SAP to Address Security Issues With Some Cloud Products and to Notify 440,000 Customers
SAP(Systems Applications and Products) announced on Monday that they are to patch security issues with some of their cloud-based products. The bugs are identified as a part of the internal…
Published Exploits for Accessing SAP Systems Put Security Teams on Alert
In April 2019, researchers Dmitry Chastuhin and Mathieu Geli presented a talk at the OPCDE Cyber Security Conference about two pieces of exploit code that allow anyone to interact with…
Published Exploits for Accessing SAP Systems Put Security Teams on Alert
In April 2019, researchers Dmitry Chastuhin and Mathieu Geli presented a talk at the OPCDE Cyber Security Conference about two pieces of exploit code that, if used by attackers, can…
‘All the Queen’s Horses’: A Real-World Use Case for Managing Insider Threats
Insider threats pose a persistent security risk to the enterprise today. According to the “IBM X-Force Threat Intelligence Index 2018,” inadvertent insiders were responsible for more than two-thirds of total…
Getting Your Organization Up to Speed With SAP GRC
In most complex systems, especially those like SAP that handle enormous amounts of transaction data, defining an approach to governance, risk and compliance (GRC) can feel overwhelming. But SAP GRC…