Onapsis Bizploit v1.50 – SAP Penetration Testing Framework

Onapsis Bizploit is an SAP penetration testing framework to assist security professionals in the discovery, exploration, vulnerability assessment and exploitation phases of specialized SAP security assessment. The framework currently ships with many plugins to assess the security of SAP Business Platforms. Additional plugins are available for broader platform support including Oracle.

Read more here.

Guidelines on the auditing framework for Trust Service Providers

A new ENISA report provides guidelines on the auditing framework for Trust Service Providers (TSPs). These guidelines can be used by TSPs (preparing for audits) and Conformity Assessment Bodies (auditors) having to undergo regular auditing – as set by the eIDAS regulation – and offer a set of good practices which can be used at an organizational level.

The report gives an overview of a typical three-stage audit methodology, listing all relevant requirements for the off-site (documentation level) and on-site (implementation level) assessment procedure, which is finalized with a conformity assessment report.

Read more here.

Computer hacker steals Kiwi’s money before his eyes

A New Zealand man watched powerlessly as a computer hacker remotely accessed his PC and started draining his PayPal account with online purchases. Hamilton man Girish Kuruvilla woke at 3am to the sound of his mobile phone vibrating incessantly, and thinking it might be a family emergency from his native India he went to take the phone call.

Instead, the screen of his smartphone was flooded with emails confirming purchases made from his PayPal account that was linked to his ANZ credit card.

Read more here.

Commix – Command Injection Attack Tool

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used by web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.

Read more here.

Dyre Wolf attack swipes $1 million in wire transfers

Hackers continue their brazen attacks on organizations and are even having their victims call them on the phone to hustle them out of their company’s money. That’s what IBM’s Security Intelligence division has discovered while researching a malware-based attack they have dubbed The Dyre Wolf that’s responsible for stealing more than $1 million.

Download the full IBM report here.