Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
          Vulnerability management for SAP systems.
        • Defend
          Real-time SAP threat detection & response.
        • Control
          SAP transport analysis & code security.
        • Security Advisor
          AI-powered SAP security guidance.
      • Specialized Solutions
        • Onapsis for SAP BTP
          Purpose-built security for SAP Business Technology Platform.
        • Assess for SAP Success Factors
          Automated security for SAP SuccessFactors HR cloud apps.
        • Premium Add-Ons
          Enhance protection with premium tools & integrations.
      Interactive

      SAP Security & Compliance Evaluation

      Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

      Start Now

      Platform Overview

  • SolutionsExpand
      • By Initiative
        • Accelerate SAP S/4HANA Transformations
          Secure your SAP S/4HANA migration from start to finish.
        • Achieve Automated Compliance
          Automate audits and continuous SAP compliance.
        • Cyber Resilience for RISE with SAP
          Secure your RISE with SAP cloud migration and deployment.
        • Incident Response
          Rapid response and forensics for SAP security breaches.
        • Strengthen DevSecOps
          Shift SAP security left to find flaws in custom ABAP code and BTP.
        • Threat Detection & Response
          Continuous threat monitoring to stop active SAP exploits.
        • Vulnerability Management
          Discover, prioritize, and remediate SAP vulnerabilities.
      • By Industry
        • Automotive Manufacturing
          Protect automotive SAP systems and supply chain data.
        • Financial Services
          Secure banking SAP systems to protect financial data.
        • Food & Beverage Manufacturing
          Secure food manufacturing ERP’s and ensure compliance
        • Government
          Secure public sector SAP systems against advanced threats.
        • Healthcare
          Protect critical healthcare ERP’s and patient data systems.
        • Heavy Manufacturing
          Protect industrial SAP systems and manufacturing uptime.
        • Oil & Gas
          Secure energy sector SAP systems and ensure uptime.
        • Pharmaceuticals
          Secure life science SAP systems, IP, and regulatory compliance.
        • Electric & Utilities
          Defend critical infrastructure and utility SAP systems.
        • Retail Manufacturing
          Secure retail SAP systems and protect supply chain data.
      Webinar

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      Learn how to build cyber resilience during your SAP cloud migration journey.

      Watch Now

  • ResourcesExpand
      • Learn
        • Blog
          Expert insights and industry trends
        • Webinars
          Watch presentations on-demand
        • Videos
          Product demos and tutorials
        • Knowledge Articles
          Educational guides on core SAP security concepts
      • Read
        • Case Studies
          Real-world customer success stories
        • E-Books
          In-depth security guides
        • White Papers
          Research and analysis reports
        • Solution Briefs
          Product capabilities overview
      • Resources
        • Datasheets
          Product specifications
        • Infographics
          Visual data and statistics
        • Threat Reports
          SAP threat landscape analysis
        • The Defenders Digest
          Monthly security newsletter
      Threat Report

      SAP Cyber Attack Compromises Global Manufacturer

      Executive overview of a reported SAP cyber attack that severely impacted business operations.

      Read Now

      View all resources

  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
          Leaders in offensive SAP security research
        • RECON
          Remotely Exploitable Code On NetWeaver
        • CVE-2025-31324 & CVE-2025-42999
          The SAP zero-day that changed everything.
        • C2 Incident on SAP
          Anatomy of a command and control attack
        • CH4TTER
          Threat actors attacking SAP for profit
        • ICMAD
          Internet Communication Manager vulnerabilities
        • P4CHAINS
          P4CHAINS family of vulnerabilities
        • 10KBLAZE
          Critical security configuration risk
      Docuseries

      Hacking & Defending SAP Applications – Live

      We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

      Watch Now

      Subscribe to SAP Security Note Newsletter

  • CompanyExpand
      • Company
        • Leadership
          Meet our executives
        • Recognition
          Awards & accolades
        • Careers
          Join our team
        • News & Press
          View latest announcements
        • Partners
          Our partner ecosystem
        • Giving Back
          OneCares community engagement
        • Events
          Conferences & meetings
        • Contact Us
          Get in Touch
      Solution Brief

      10 Reasons Why More Companies Choose Onapsis

      Discover why leading enterprises tryst Onapsis to secure their most critical business applications

      Read More

  • ENExpand
    • DE
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
  • EN
    • DE
Search
  • Battling Trojan Horses in Your SAP® Transports
    E-Books

    Battling Trojan Horses in Your SAP® Transports

    Battling Trojan Horses in Your SAP® Transports
    Changes to SAP production systems through SAP transports pose a high security risk. These potential “Trojan horses” sneak in malicious content or changes, providing a gateway for espionage, data theft and data manipulation. The damage to an affected company can be considerable, ranging from financial and reputation loss to substantial penalties associated with violations of legal data protection regulations. Nevertheless, many companies are still unaware of the potential dangers of transports for SAP security. In addition, conventional analysis tools are unable to identify the Trojans hidden in SAP transport files. Transport analysis from Onapsis closes this gap with minimal effort. Download the Battling Trojan Horses in Your SAP® Transports e-book now to learn more.

    Read More Battling Trojan Horses in Your SAP® TransportsContinue

  • A Year in Review with Onapsis Research Labs
    Webinars

    A Year in Review with Onapsis Research Labs

    On Demand Webinar A Year in Review with Onapsis Research Labs JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL)  recap trends from 2023 and provide best practices to prepare you for threats in 2024. You’ll walk away with an understanding of: Key macro trends and observations gleaned from the extensive research conducted by…

    Read More A Year in Review with Onapsis Research LabsContinue

  • Onapsis Webinar
    Webinars

    A Year in Review with Onapsis Research Labs

    JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) recap SAP security trends from 2023 and provide best practices to prepare you for 2024.

    Read More A Year in Review with Onapsis Research LabsContinue

  • 5 Challenges for CIOs E-book
    E-Books

    5 Challenges for CIOs E-book

    The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This e-book reviews five challenges CIOs face when dealing with SAP security, including recommendations for overcoming these challenges.

    Read More 5 Challenges for CIOs E-bookContinue

  • Onapsis Podcasts
    Podcasts

    The State of ERP Security

    Businesses rely on enterprise resource planning (ERP) systems like SAP to consolidate their critical assets, data, and intellectual property. While these systems unify platforms and departments, centralizing vast amounts of enterprise data makes them attractive targets for malicious actors. An interconnected system with inadequate ERP security heightens the risk of attacks, making ERP systems prime…

    Read More The State of ERP SecurityContinue

  • Onapsis Webinar
    Webinars

    Navigating SAP Security: Strategies for Seamless Compliance

    On Demand Webinar Navigating SAP Security: Strategies for Seamless Compliance In this insightful session, an Onapsis expert will guide you through: Establishing a seamless, automated, and repeatable compliance reporting and audit process. Unlocking efficiencies to liberate valuable resources within your organization. Mastering the recording, logging, and auditing of activities to meet regulatory compliance standards such…

    Read More Navigating SAP Security: Strategies for Seamless ComplianceContinue

  • SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals
    Webinars

    SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals

    SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals In the new technological landscape, nothing is ever internal-only or running on a secure system—including SAP. Hear how using Onapsis as a customer can successfully create a Vulnerability Management Program for your SAP landscape. Speakers Gaurav Singh | SAP Cyber Security Manager | Under Armour…

    Read More SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business GoalsContinue

  • Onapsis Autumn 2023 Launch Review
    Webinars

    Onapsis Autumn 2023 Launch Review

    On Demand Webinar Onapsis Autumn 2023 Launch Review As the undisputed market leader in business-critical application security for the past 14 years, Onapsis continues to drive the market forward with innovative product releases built to address evolving threats affecting SAP and Oracle applications. Every year, Onapsis releases new features and capabilities designed to improve visibility,…

    Read More Onapsis Autumn 2023 Launch ReviewContinue

  • SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals
    Webinars

    SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals

    Join David D’Aprile, Vice President of Product Marketing, and Alex Horan, Vice President of Product Management for a look back at 2023’s release highlights…

    Read More SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business GoalsContinue

Page navigation

Previous PagePrevious 1 … 19 20 21 22 23 … 44 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
Platform
Solutions
Resources
Threat Research
Company
Go Back
  • Platform
    • Assess
      Vulnerability management for SAP systems.
    • Defend
      Real-time SAP threat detection & response.
    • Control
      SAP transport analysis & code security.
    • Security Advisor
      AI-powered SAP security guidance.
  • Specialized Solutions
    • Onapsis for SAP BTP
      Purpose-built security for SAP Business Technology Platform.
    • Assess for SAP Success Factors
      Automated security for SAP SuccessFactors HR cloud apps.
    • Premium Add-Ons
      Enhance protection with premium tools & integrations.
Interactive

SAP Security & Compliance Evaluation

Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

Start Now

Platform Overview

  • By Initiative
    • Accelerate SAP S/4HANA Transformations
      Secure your SAP S/4HANA migration from start to finish.
    • Achieve Automated Compliance
      Automate audits and continuous SAP compliance.
    • Cyber Resilience for RISE with SAP
      Secure your RISE with SAP cloud migration and deployment.
    • Incident Response
      Rapid response and forensics for SAP security breaches.
    • Strengthen DevSecOps
      Shift SAP security left to find flaws in custom ABAP code and BTP.
    • Threat Detection & Response
      Continuous threat monitoring to stop active SAP exploits.
    • Vulnerability Management
      Discover, prioritize, and remediate SAP vulnerabilities.
  • By Industry
    • Automotive Manufacturing
      Protect automotive SAP systems and supply chain data.
    • Financial Services
      Secure banking SAP systems to protect financial data.
    • Food & Beverage Manufacturing
      Secure food manufacturing ERP’s and ensure compliance
    • Government
      Secure public sector SAP systems against advanced threats.
    • Healthcare
      Protect critical healthcare ERP’s and patient data systems.
    • Heavy Manufacturing
      Protect industrial SAP systems and manufacturing uptime.
    • Oil & Gas
      Secure energy sector SAP systems and ensure uptime.
    • Pharmaceuticals
      Secure life science SAP systems, IP, and regulatory compliance.
    • Electric & Utilities
      Defend critical infrastructure and utility SAP systems.
    • Retail Manufacturing
      Secure retail SAP systems and protect supply chain data.
Webinar

Securing Your Future: Preparing for a Successful SAP RISE Transformation

Learn how to build cyber resilience during your SAP cloud migration journey.

Watch Now

  • Learn
    • Blog
      Expert insights and industry trends
    • Webinars
      Watch presentations on-demand
    • Videos
      Product demos and tutorials
    • Knowledge Articles
      Educational guides on core SAP security concepts
  • Read
    • Case Studies
      Real-world customer success stories
    • E-Books
      In-depth security guides
    • White Papers
      Research and analysis reports
    • Solution Briefs
      Product capabilities overview
  • Resources
    • Datasheets
      Product specifications
    • Infographics
      Visual data and statistics
    • Threat Reports
      SAP threat landscape analysis
    • The Defenders Digest
      Monthly security newsletter
Threat Report

SAP Cyber Attack Compromises Global Manufacturer

Executive overview of a reported SAP cyber attack that severely impacted business operations.

Read Now

View all resources

  • Threat Research
    • Onapsis Research Labs
      Leaders in offensive SAP security research
    • RECON
      Remotely Exploitable Code On NetWeaver
    • CVE-2025-31324 & CVE-2025-42999
      The SAP zero-day that changed everything.
    • C2 Incident on SAP
      Anatomy of a command and control attack
    • CH4TTER
      Threat actors attacking SAP for profit
    • ICMAD
      Internet Communication Manager vulnerabilities
    • P4CHAINS
      P4CHAINS family of vulnerabilities
    • 10KBLAZE
      Critical security configuration risk
Docuseries

Hacking & Defending SAP Applications – Live

We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

Watch Now

Subscribe to SAP Security Note Newsletter

  • Company
    • Leadership
      Meet our executives
    • Recognition
      Awards & accolades
    • Careers
      Join our team
    • News & Press
      View latest announcements
    • Partners
      Our partner ecosystem
    • Giving Back
      OneCares community engagement
    • Events
      Conferences & meetings
    • Contact Us
      Get in Touch
Solution Brief

10 Reasons Why More Companies Choose Onapsis

Discover why leading enterprises tryst Onapsis to secure their most critical business applications

Read More

Customer Portal
Partner Portal

Contact Us