The Onapsis Security Blog

Die Welt der Sicherheit und Compliance-Konformität von geschäftskritischen Anwendungen ist äußerst dynamisch. In unseren Blog-Posts finden Sie Beobachtungen, Einblicke und Empfehlungen zu den neuesten Nachrichten zum Schutz Ihrer SAP®- und Oracle®-Anwendungen.

Thumbnail
January '20 Oracle CPU Analysis: Oracle fixes a critical vulnerability that can lead to financial fraud

January '20 Oracle CPU Analysis: Oracle fixes a critical vulnerability that can lead to financial fraud

Today Oracle released the first Critical Patch Update of the year that contains 334 new security patches and a total of 23 patches for Oracle E-Business Suite (EBS), one of the most used ERP software in the World. Among these fixes, the two most critical ones were reported by Onapsis Research Labs and are related to the already known PAYDAY vulnerabilities that we explained a few months ago in a public report.

Thumbnail
2019 Year in Review Partners

2019 Year in Review for Onapsis Partners

2019 was an incredible year for Onapsis, with significant growth enabled with strategic partnerships, fueled by the acquisition of Virtual Forge and supported by our growing customer base. Thank you to all our partners for being a part of our continued success, and thank you for working with Onapsis to provide enterprises with comprehensive protection for their SAP and Oracle platforms.
Thumbnail
Securing Your Sap and Securing the Security of Your Sap

Securing Your Sap and Securing the Security of Your Sap

In June 2019, one month after the advisory from US-CERT regarding 10KBlaze, csoonline.com published an interview with Juan Perez-Etchegoyen, CTO of Onapsis, Jonathan Haun, senior director at Enowa LLC, and Gert Schroeter, vice president of security communications at SAP Global Security. In this interview they explained eight of the top most common configuration errors and security failures within enterprise SAP environments.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Engagieren