Business Application Security
1.8K views | +2 today
Follow
Business Application Security
Your new post is loading...
Your new post is loading...
Scooped by erpscan
Scoop.it!

SAP HANA Pentesting. Part 1: Vulnerabilities history

SAP HANA Pentesting. Part 1: Vulnerabilities history | Business Application Security | Scoop.it
Three years have passed since the day when we published the details of the first vulnerability in SAP HANA. Nowadays more and more HANA systems are used in production environments of enterprises. We decided to start a series of articles on SAP HANA Pentesting to celebrate this event and share noticeable insights about pentesting of […]
more...
No comment yet.
Scooped by erpscan
Scoop.it!

Oracle EBS application user passwords encryption

Oracle EBS application user passwords encryption | Business Application Security | Scoop.it
Oracle EBS Application users’ passwords use insecure encryption scheme. Sha-1
more...
No comment yet.
Scooped by erpscan
Scoop.it!

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 7: Unencrypted connections

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 7: Unencrypted connections | Business Application Security | Scoop.it
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Security for CISO. Part 14: SAP SoD

SAP SOD or SAP Segregation of Duties is one of the most important areas in SAP Security.
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Cyber Threat Intelligence report – September 2017

Gain insight into the latest security threats and vulnerabilities
 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Services detection via Nmap probes

This article aims at showing how to improve the capability of the Nmap network scanner to detect SAP services.
 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Cyber Threat Intelligence report – August 2017

SAP Cyber Threat Intelligence report – August 2017 | Business Application Security | Scoop.it
This set of SAP Security Notes consists of 19 patches with the majority of them rated medium
 
 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Security Notes July 2017

SAP Security Notes July 2017 | Business Application Security | Scoop.it

Learn more about SAP Security Notes released in July 2017, including SAP POS Patching.

 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

Dynamic ABAP Calls

The second category of Secure ABAP Development Guide is 'Critical Calls' and the topic of our discussion today is Dynamic ABAP Calls.
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Cyber Threat Intelligence report – March 2018

SAP Cyber Threat Intelligence report – March 2018 | Business Application Security | Scoop.it
The SAP threat landscape is always expanding thus putting organizations of all sizes and industries at risk of cyberattacks. The idea behind the monthly SAP Cyber Threat Intelligence report is to provide an insight into the latest security vulnerabilities and threats. Key takeaways The set of SAP Security Notes consists of 27 patches and the […]
more...
No comment yet.
Scooped by erpscan
Scoop.it!

Perfect SAP Penetration testing. Part 3: The Scope of Vulnerability Search

Perfect SAP Penetration testing. Part 3: The Scope of Vulnerability Search | Business Application Security | Scoop.it
This part of Perfect SAP Penetration testing series demonstrates that sometimes traditional approach does not work and describes how to do the impossible.
more...
No comment yet.
Scooped by erpscan
Scoop.it!

GDPR for SAP: How to restrict personal data processing?

GDPR for SAP: How to restrict personal data processing? | Business Application Security | Scoop.it
GDPR for SAP. General Data Protection Regulation in SAP: How to restrict personal data processing?
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP S/4 HANA Security Guide: Introduction

SAP S/4 HANA security guide. Introduction to EAS-SEC vulnerability assessment guide 2017
more...
No comment yet.
Scooped by erpscan
Scoop.it!

SAP Vulnerability Management. Part 4: Reporting

Vulnerability Management is the most fundamental security practice that provides discovery and security assessments of SAP systems.
 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

EAS-SEC. Oracle PeopleSoft Security Configuration. Part 6: Insecure settings

A typical PeopleSoft system is quite large and complex, so there are a lot of settings, which affect its security
 
more...
No comment yet.
Scooped by erpscan
Scoop.it!

GDPR for SAP: How to find personal data and assess privacy risks?

GDPR for SAP: How to find personal data and assess privacy risks? | Business Application Security | Scoop.it

GDPR for SAP. General Data Protection Regulation in SAP: How to find personal data and assess SAP privacy risks

 
more...
No comment yet.