SAP & Onapsis Webinar: Log4j Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

The Onapsis Blog

Die Sicherheit von geschäftskritischen Anwendung ist dynamisch, und es gibt ständig neue Entwicklungen. In unserem Blog finden Sie Empfehlungen, Einblicke und Beobachtungen zu den neuesten Nachrichten für die Sicherung Ihrer SAP®-, Oracle®- und Salesforce-Anwendungen.

Gaston Traberg

Gaston Traberg

Security Researcher

Gaston is a Security Researcher at the Onapsis Research Labs. He holds a computer degree from Universidad Nacional de La Plata (UNLP), where he worked for more than six years on the CERT Team, handling computer security incidents at the university infrastructure. Before joining Onapsis he also worked as an Ethical Hacker for several companies. Currently, he work on discovering security vulnerabilities in SAP and Oracle and creating detection rules for ERP attacks for the Onapsis Security Platform.

Thumbnail

Oracle’s July 2019 CPU Patches Three Critical Vulnerabilities in E-Business Suite Reported by Onapsis

Our quarterly analysis on how to improve your Oracle EBS security and take care of your most critical information by exploring the latest Oracle Critical Patch Updates for July 2019. This month, six of 13 total EBS vulnerabilities were reported by Onapsis, four in Oracle Payments.
Thumbnail

Clickjacking SAP Security Notes: Where to start?

Introduction

A few months ago, we published a post about Clickjacking attacks, analyzing the nature of the attack, its related security notes and statistics on the attacks themselves. Even though this type of attack is not new, it’s an important aspect for the SAP world to understand, especially considering its relevancy after July’s security notes release.

Sichern Sie Ihre
geschäftskritischen SAP-, Oracle-, SalesForce
und SaaS-Anwendungen

Verschaffen Sie sich aus erster Hand einen Überblick über die Transparenz, das Reporting und die Automatisierungsmöglichkeiten der Onapsis-Plattform, indem Sie eine persönliche Demo mit unseren Experten für Anwendungssicherheit vereinbaren.

Demo anfordern