Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
        • Defend
        • Onapsis for SAP BTP
        • Control
        • Assess for SAP Success Factors
        • Security Advisor
        • Premium Add-Ons
      Request a demo
      Onapsis Webinar
      Webinars

      Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management

      WATCH NOW Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management
  • SolutionsExpand
      • Solutions
        • By Initiative
          • Accelerate SAP S/4HANA Transformations
          • Achieve Automated Compliance
          • Building Cyber Resilience for RISE with SAP
          • Incident Response
          • Secure SAP Cloud Migration & Operation
          • Strengthen DevSecOps
          • Strengthen SAP Security for NIS2 Compliance
          • Threat Detection & Response
          • Vulnerability Management
        • By Industry
          • Financial Services
          • Food & Beverage Manufacturing
          • Government
          • Healthcare
          • Heavy Manufacturing
          • Industrial Chemicals
          • Pharmaceuticals
          • Electric & Utilities
          • Oil & Gas
          • Personal Care Manufacturing
          • Retail Manufacturing
      Onapsis Webinar
      Webinars

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      WATCH NOW Securing Your Future: Preparing for a Successful SAP RISE Transformation
  • ResourcesExpand
      • Resources
        • Blog
        • Case Studies
        • Datasheets
        • eBooks
        • Infographics
        • Knowledge Articles
        • Podcasts
        • Publications
        • Security Advisories
        • Solution Briefs
        • Threat Reports
        • Videos
        • Webinars
        • White Papers
      Subscribe To Our Newsletter
      Datasheets

      Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer

      READ NOW Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer
  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
        • CVE-2025-31324 & CVE-2025-42999
        • CH4TTER
        • C2 Incident on SAP
        • P4CHAINS
        • ICMAD
        • RECON
        • 10KBLAZE
      Watch The Defenders Digest
      Onapsis Webinar
      Webinars

      Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)

      WATCH NOW Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)
  • CompanyExpand
      • Company
        • Partners
        • Giving Back
        • Leadership
        • Careers
        • Events
        • News & Press
        • Recognition
        • Contact Us
      Subscribe to Our Newsletter
      Solution Briefs

      10 Reasons Why More Companies Choose Onapsis

      READ MORE 10 Reasons Why More Companies Choose Onapsis
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Leitfaden zur NIS2-Richtlinie mit Onapsis
    Infographics

    Leitfaden zur NIS2-Richtlinie mit Onapsis

    NIS2 verschärft die Anforderungen, um die Sicherheit, Widerstandsfähigkeit und Reaktionsfähigkeit des öffentlichen und privaten Sektors weiter zu verbessern.

    Read More Leitfaden zur NIS2-Richtlinie mit OnapsisContinue

  • Umsetzung der NIS2-Richtlinie
    White Papers

    Umsetzung der NIS2-Richtlinie

    Die Integration von SAP-Sicherheit in Ihr Unternehmen trägt zum Schutz Ihrer Systeme, Prozesse, Technologien und Mitarbeiter bei und hilft Ihnen, die Komplexität der NIS2- Compliance mit Leichtigkeit zu bewältigen.

    Read More Umsetzung der NIS2-RichtlinieContinue

  • Navigating the NIS2 Directive with Onapsis
    White Papers

    Navigating the NIS2 Directive with Onapsis

    Building SAP security into your organization helps protect your systems, processes, technology, and personnel, helping you navigate the complexities of NIS2 compliance with ease.

    Read More Navigating the NIS2 Directive with OnapsisContinue

  • Onapsis Webinar
    Webinars

    Siemens Healthineers’ New SAP Security Approach Powered by Onapsis

    Learn how the company ensures resilience and robustness against evolving cyber threats and maintains operational continuity and compliance.

    Read More Siemens Healthineers’ New SAP Security Approach Powered by OnapsisContinue

  • Onapsis Webinar
    Webinars

    Siemens Healthineers’ New SAP Security Approach Powered by Onapsis

    Learn how the company ensures resilience and robustness against evolving cyber threats and maintains operational continuity and compliance.

    Read More Siemens Healthineers’ New SAP Security Approach Powered by OnapsisContinue

  • BTP Solution Brief
    Solution Briefs

    Onapsis Assess for SAP BTP

    Empower Your Business Users Without Sacrificing SAP Security with Onapsis Assess for SAP BTP

    Read More Onapsis Assess for SAP BTPContinue

  • ERP-Sicherheit in Zeiten von KI-gestützter Ransomware
    Infographics

    ERP-Sicherheit in Zeiten von KI-gestützter Ransomware

    Enterprise resource planning (ERP) systems, like SAP and Oracle E-Business Suite (EBS), are the operational engine of many organizations—running business-critical applications and holding the sensitive data needed for businesses to function.

    Read More ERP-Sicherheit in Zeiten von KI-gestützter RansomwareContinue

  • ERP Security in the Age of Ransomware
    Infographics

    ERP Security in the Age of Ransomware

    Find out how ransomware attacks are affecting enterprises. Learn valuable insights and discover how to protect your ERP applications.

    Read More ERP Security in the Age of RansomwareContinue

  • Onapsis Webinar
    Webinars

    Anatomy of an Attack: Breaking Down a C2 Incident on SAP

    Our team will review the details of this attack including source IP addresses, the malicious file, the installation of midnight commander, and cover the commands that were executed on the host system that included an assessment of the compromised SAP system during this session.

    Read More Anatomy of an Attack: Breaking Down a C2 Incident on SAPContinue

Page navigation

Previous PagePrevious 1 … 10 11 12 13 14 … 41 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Solutions
    • Solutions Overview
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Industries Overview
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Resources
    • Resources Overview
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • Watch the Defenders Digest
  • Threat Research
    • Threat Research Overview
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
    • 10KBlaze
  • Company
    • Company Overview
    • Become a Partner
    • Giving Back
    • Leadership
    • Careers
    • Events
    • News & Press
    • Contact Us
    • Recognition
Customer Portal
Partner Portal

Contact Us