Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

SAP Security Podcasts

show episodes
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Transformation Every Day

Alexander Greb & Johannes Langguth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Expert Insights and Stories on SAP and beyond. Transformation Every Day is the podcast for anyone passionate about Digital Transformation done right in the SAP universe. Join hosts Alexander Greb and Johannes Langguth, along with leading experts from SAP and beyond, as they dive deep into what successful digital transformation really takes. Get ready for candid conversations, inspiring experts insights, best practices and practical strategies to drive impactful change in your organization.
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
The ERP & Data Management News Briefing delivers concise, actionable updates on the technologies, strategies, and players shaping enterprise resource planning and data management. Each episode distills the latest developments in software, cloud platforms, analytics, and governance—helping IT leaders, business analysts, and decision-makers stay ahead without wading through endless reports. From new vendor launches to emerging best practices in integration, security, and compliance, you’ll get ...
  continue reading
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Artwork

1
State of the CIO

Dan Kelly

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
State of the CIO features senior IT professionals from leading organizations across America. Talking points on the show include the role of the CIO in business transformation, innovative AI implementation, and consumer engagement as a path to growth. Tune in every week to hear insights from the leading lights of enterprise Information Technology.
  continue reading
 
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
  continue reading
 
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
  continue reading
 
Loading …
show series
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. Introducing Our Technical Series: The Building Blocks of SAP Role Design. In the first episode of our new Technical Series, we unpack the foundations of SAP authorisations — what they are, how they function, and why they matte…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
  continue reading
 
Guest: Jon Reed - CoFounder diginomica - Enterprise Analyst Host: Alexander Greb - Consulting Director - cbs corporate business solutions Summary: In this conversation, Jon Reed discusses the role of AI in business transformation, emphasizing that AI should be viewed as an accelerant rather than a standalone solution. He highlights the importance o…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Wh…
  continue reading
 
Guest: Marc Priestley - Ex-Chief Mechanic - McLaren Racing Formula One Host: Alexander Greb - Consulting Director - cbs corporate business solutions Summary: Former McLaren Chief Mechanic Marc Priestley reveals how World Champion Formula One teams think, innovate, and adapt under extreme pressure — and why that mindset is exactly what most SAP tran…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
Detection engineering just got real! Eden Naftali and Amitai sit down with detection engineering powerhouse Alex Hurtado - and it's a must-listen for anyone in cloud security. 👇 🔍 What's inside: The evolution of detection engineering in the cloud — and why traditional rules no longer apply Why DIY detections > vendor defaults How AI is reshaping de…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Künstliche Intelligenz verändert die Innovationsprozesse von Unternehmen – aber nur, wenn sie sicher ist. In diesem Gespräch erklärt Stefan Bamberg, Director Sales and Key Account Management bei Wibu-Systems, wie Schutz, Lizenzierung und Compliance das Fundament für vertrauenswürdige KI und nachhaltige Geschäftsmodelle bilden. Highlights: Die doppe…
  continue reading
 
Watch or listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In our latest technical podcast episode, we dive deep into a crucial piece of the SAP authorisation puzzle — authorisation default values. You’ll discover: How authorisation defaults determine which checks are performed during…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
🔍 From discovering VS Code supply chain risks → to uncovering Redis Shell vulnerabilities. Eden Naftali and Amitai sat down to unpack: 👇 How VS Code extensions became a critical supply chain risk (w/ Rami McCarthy) What RediShell reveals about attacker innovation Where AI is being weaponized in modern malware 🎙️ Listen now to our NEW Crying Out Clo…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and pat…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
Guest: Lukas Bretschneider - Architecture Lead Clean Core Extensibility, SAP SE Hosts: Alexander Greb - Consulting Director - cbs corporate business solutions Johannes Langguth - Head of Business Transformation and Architecture - SAP SE Clean Core — it’s more than a technical concept. It’s a new mindset that challenges how we think about SAP develo…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot …
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a s…
  continue reading
 
Guest: Jan Gilg - Ext. Board Member, CRO Business Suite and Head of SAP Americas, SAP Hosts: Alexander Greb - Consulting Director - cbs corporate business solutions Johannes Langguth - Head of Business Transformation and Architecture - SAP SE In this episode, we sit down with one of SAP’s most influential leaders — Jan Gilg, Member of the Extended …
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Co…
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
In this joint interview, SAP and Wibu-Systems explain how entitlement management and licensing protection work hand-in-hand to empower ISVs and device manufacturers.Key takeaways include: Why SAP Entitlement Management (EMS) is central to SAP’s Suite-as-a-Service strategy and the quote-to-cash process. How EMS defines rights and entitlements — from…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play