Daniel Antonelli actually works as Security Researcher for Onapsis Research Labs. He has been working on Monitoring & Security for more than seven years. In the past he previously lead the Support Team for a monitoring security company in Argentina and Spain focused on help companies maintaining operational health in their processes, to comply with security audits and to increase productivity. He visited several customers and provided them the necessary knowledge and methodology to ensure real-time visibility across the company. Currently, he works on analyzing SAP Security Notes and providing content for Onapsis Security Platform (vulnerability assessment modules and detection rules) and also provides support for customers when it is related to product content.
SAP Security Notes August ‘18: SQL Injection in BusinessObjects and Several High Priority Notes to take care of.
As our readers know, we continuously share details to raise awareness and enable organizations to further secure their SAP infrastructure. In this specific blog, we will focus on one of the well-known SAP default users: TMSADM. What the security implications are of having it enabled with default passwords, and how to properly protect it? As you can imagine, it is not as simple as it sounds, so that’s why we created this blogpost for you.
Subscribe to our monthly newsletter, the Defender's Digest!Subscribe