Onapsis is more than your typical application cybersecurity company. We’re different because our solutions help eliminate the costs and risks preventing you from building better, smarter and more dynamic applications, faster and more securely. We protect you at the core of your business, keeping the business-critical applications you depend on daily secure, compliant and available. Because we’re application-focused, we’re also deeply invested in enabling your future—helping you build in the cyber resilience you need to pursue digital transformation.
In this blog, we cover the 10 top-scoring vulnerabilities from the first half of 2020. Of those, half were detected by Onapsis Research Labs, including the most severe.
It is nearly impossible to create error-free software or hardware, and for complex systems, this is even more true. Not every bug is a vulnerability, but many bugs are. A CVSS score ranks these vulnerabilities from highest to lowest priority.
To help businesses identify if their systems are vulnerable, Onapsis has released Instant RECON, an online service and downloadable free and open source tool to scan your internal and external SAP instances to identify if it is patched against the RECON vulnerability, and to look for likely indicators of compromise (IoC) from a successful exploit of RECON.
SAP code is mostly written in ABAP, and it is an integral part of securing your SAP systems. ABAP developers often struggle to keep up with new and increasing changes and requirements in the fields of code security and code quality, leading to major vulnerabilities or misconfigurations within your SAP system.
Today, Onapsis is releasing a Threat Research Report about critical vulnerabilities that the Onapsis Research Labs found in the Oracle E-Business Suite and worked with the Oracle Security Response Team to fix in Oracle’s January 2020 Critical Patch Update.
As organizations plan for the new normal, many business leaders expect that the traditional onsite interviews will not make a come back for some time. While hiring security talent continues to be a priority, we want to be sure that candidates have the tools to succeed in this new climate.
Transports are considered an essential part of the SAP environment for day-to-day business. Used to transfer SAP content from one system to another, transports carry incredibly sensitive data, and even a secure production system can be compromised.
Subscribe to our monthly newsletter, the Defender's Digest!Subscribe