Unbreakable oracle er_ps_siebel_jd_edwards
Penetration Testing SAP Systems
Onapsis no suchcon-transporting-evil_code_into_the_business-attacks_on_sap_tms
How Hackers can Open the Safe and Take the Jewels
Dissecting and Attacking RMI Frameworks
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConference2012)
SAP Forensics Detecting White Collar Cyber-crime
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Cyber-attacks to SAP Systems
Onapsis SAP Backdoors
Pen Testing SAP Critical Information Exposed
Attacks Based on Security Configurations
SAP Business Objects Attacks
Incident Response and SAP Systems
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Onapsis Security Platform: Detection and Response
Blended Web and Database Attacks on Real Time In-memory Platforms
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough