Click here to visit Original posting
Companies using SAP systems for their business software infrastructure might want to review some of their servers' settings for a configuration that if left in its default state will let an attacker gain access to a company's business data. [...]