The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyber attacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats.
SAP S/4HANA is a shortened version of SAP Business Suite 4 SAP HANA. Basically, it is a new generation of SAP Business Suite. But before we dive into details, let’s start from the beginning.
Nobody will argue that IT security is vital in our modern world, particularly for businesses. Cybercrime is getting worse and systems become more vulnerable with time, making organizations more susceptible to cyberattacks and financial losses. That’s why the topic of cybercrime demands more attention and cyber-awareness.
ERP security is a separate part of IT security. Nowadays ERP stands for a huge range of various tools and services written on the base of different technologies. It’s critical to possess proper knowledge in the security field and convenient tools for managing.
Three years have passed since the day when we published the details of the first vulnerability in SAP HANA. Nowadays more and more HANA systems are used in production environments of enterprises. We decided to start a series of articles on SAP HANA Pentesting to celebrate this event and share noticeable insights about pentesting of this platform. Within this period of time, we have accumulated a lot of knowledge about the organization of SAP HANA security, and now, we want to share it with you.
With this article, we start the second section of Secure ABAP Development Guide called ‘Critical Calls’.
Not only injection vulnerabilities are able to harm the systems but also some statements in ABAP. In this category, most of them (not all!) are not so severe as injections but the inadvertent operation can lead to critical vulnerabilities.
Nowadays, Oracle is widely known as one of the leaders in the production of enterprise software. Among its products, there is Oracle EBS (E-Business Suite), which is a huge ERP system used in various industries, such as Automobile, Aerospace and Defense, Engineering and Construction, Health Sciences, Hospitality, Professional Services, etc.
The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyberattacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats.
In this article we will show how to adapt hashcat to work with SAP’s “half hashes”.
SAP BASIS administrators perform numerous critical activities to ensure high availability as well as the efficient and continuous operation of SAP systems deployed in the corporate environment. They are saddled with the responsibility of making sure that the system works optimally. Luckily, a compiled list of resources can relieve the duties.
These are top SAP cybersecurity articles every SAP BASIS admin must read. If you are an SAP BASIS admin, they will support you with succeeding in SAP administration. Happy browsing!