The Onapsis Security Blog

The world of business-critical application security and compliance is dynamic, with new developments happening on a continuous basis. Read our blog posts for recommendations, insights and observations on the latest news for safeguarding your SAP® and Oracle® applications.

Daniel Antonelli

Security Researcher

Daniel Antonelli actually works as Security Researcher for Onapsis Research Labs. He has been working on Monitoring & Security for more than seven years. In the past he previously lead the Support Team for a monitoring security company in Argentina and Spain focused on help companies maintaining operational health in their processes, to comply with security audits and to increase productivity. He visited several customers and provided them the necessary knowledge and methodology to ensure real-time visibility across the company. Currently, he works on analyzing SAP Security Notes and providing content for Onapsis Security Platform (vulnerability assessment modules and detection rules) and also provides support for customers when it is related to product content.

Thumbnail
Blog Banner

TMSADM user with Default Password: another risk in your SAP system

As our readers know, we continuously share details to raise awareness and enable organizations to further secure their SAP infrastructure. In this specific blog, we will focus on one of the well-known SAP default users: TMSADM. What the security implications are of having it enabled with default passwords, and how to properly protect it? As you can imagine, it is not as simple as it sounds, so that’s why we created this blogpost for you.

Request a
Business Risk Illustration

Examine the security posture and risk exposure of your business-critical applications to determine the potential impact of a cyberattack on your organization.

Engage