Stay on top of the latest media coverage, and company and product announcements from the leader in business-critical application security and compliance solutions.
Oracle’s E-Business Suite (EBS) was informed about two critical security vulnerabilities in their software that could give attackers full control over a company’s enterprise resource planning (ERP) solution. These vulnerabilities were discovered by Onapsis back in December 2018 and also helped create a patch that was released in April 2019.
Over 21,000 organisations that use Oracle's E-Business Suite could be at risk of financial fraud or theft as hackers can exploit a number of critical vulnerabilities known as PAYDAY to hijack an Oracle EBS system, reroute invoice payments, and erase audit logs to cover up their activity.
Two critical security vulnerabilities discovered in Oracle's E-Business Suite (EBS) could allow potential attackers to take full control over a company's entire enterprise resource planning (ERP) solution.
Haven't gotten around to patching since last Spring? Now would be a good time
Security firm Onapsis says it has identified a series of critical vulnerabilities in Oracle’s E-Business Suite (EBS) that could allow attackers to gain “untraceable control” of electronic fund transfers and print bank checks without detection.
Malicious users can exploit the vulnerability by committing wire fraud or printing pre-approved cheques
Up to 50,000 businesses running Sap software are at risk of being hacked after security researchers uncovered new ways to exploit insufficiently protected systems.
Organizations using SAP business applications have been warned that the risk of attacks involving some old configuration issues has increased after researchers released proof-of-concept (PoC) exploits.
Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has warned.
Up to 50,000 companies running SAP software are at greater risk of being hacked after security researchers found new ways to exploit vulnerabilities of systems that haven't been properly protected and published the tools to do so online.