New SAP & Onapsis Threat Intelligence: Active Cyberattacks on Business-Critical SAP Applications

The Onapsis Blog

The world of business-critical application security is dynamic, with new developments happening on a continuous basis. Check out our blog for recommendations, insights and observations on the latest news for securing your SAP®, Oracle® and Salesforce applications.

Daniel Antonelli

Daniel Antonelli

Security Researcher

Daniel Antonelli actually works as Security Researcher for Onapsis Research Labs. He has been working on Monitoring & Security for more than seven years. In the past he previously lead the Support Team for a monitoring security company in Argentina and Spain focused on help companies maintaining operational health in their processes, to comply with security audits and to increase productivity. He visited several customers and provided them the necessary knowledge and methodology to ensure real-time visibility across the company. Currently, he works on analyzing SAP Security Notes and providing content for Onapsis Security Platform (vulnerability assessment modules and detection rules) and also provides support for customers when it is related to product content.

Thumbnail

TMSADM user with Default Password: another risk in your SAP system

As our readers know, we continuously share details to raise awareness and enable organizations to further secure their SAP infrastructure. In this specific blog, we will focus on one of the well-known SAP default users: TMSADM. What the security implications are of having it enabled with default passwords, and how to properly protect it? As you can imagine, it is not as simple as it sounds, so that’s why we created this blogpost for you.

Secure your
business-critical
SAP, Oracle, and SaaS apps

Get a firsthand look at the visibility, reporting and automation capabilities provided by The Onapsis Platform by scheduling a personalized demo with our application security experts.

Request a demo