Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
          Vulnerability management for SAP systems.
        • Defend
          Real-time SAP threat detection & response.
        • Control
          SAP transport analysis & code security.
        • Security Advisor
          AI-powered SAP security guidance.
      • Specialized Solutions
        • Onapsis for SAP BTP
          Purpose-built security for SAP Business Technology Platform.
        • Assess for SAP Success Factors
          Automated security for SAP SuccessFactors HR cloud apps.
        • Premium Add-Ons
          Enhance protection with premium tools & integrations.
      Interactive

      SAP Security & Compliance Evaluation

      Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

      Start Now

      Platform Overview

  • SolutionsExpand
      • By Initiative
        • Accelerate SAP S/4HANA Transformations
          Secure your SAP S/4HANA migration from start to finish.
        • Achieve Automated Compliance
          Automate audits and continuous SAP compliance.
        • Cyber Resilience for RISE with SAP
          Secure your RISE with SAP cloud migration and deployment.
        • Incident Response
          Rapid response and forensics for SAP security breaches.
        • Strengthen DevSecOps
          Shift SAP security left to find flaws in custom ABAP code and BTP.
        • Threat Detection & Response
          Continuous threat monitoring to stop active SAP exploits.
        • Vulnerability Management
          Discover, prioritize, and remediate SAP vulnerabilities.
      • By Industry
        • Automotive Manufacturing
          Protect automotive SAP systems and supply chain data.
        • Financial Services
          Secure banking SAP systems to protect financial data.
        • Food & Beverage Manufacturing
          Secure food manufacturing ERP’s and ensure compliance
        • Government
          Secure public sector SAP systems against advanced threats.
        • Healthcare
          Protect critical healthcare ERP’s and patient data systems.
        • Heavy Manufacturing
          Protect industrial SAP systems and manufacturing uptime.
        • Oil & Gas
          Secure energy sector SAP systems and ensure uptime.
        • Pharmaceuticals
          Secure life science SAP systems, IP, and regulatory compliance.
        • Electric & Utilities
          Defend critical infrastructure and utility SAP systems.
        • Retail Manufacturing
          Secure retail SAP systems and protect supply chain data.
      Webinar

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      Learn how to build cyber resilience during your SAP cloud migration journey.

      Watch Now

  • ResourcesExpand
      • Learn
        • Blog
          Expert insights and industry trends
        • Webinar
          Watch presentations on-demand
        • Videos
          Product demos and tutorials
        • Knowledge Articles
          Educational guides on core SAP security concepts
      • Read
        • Case Studies
          Real-world customer success stories
        • E-Books
          In-depth security guides
        • White Papers
          Research and analysis reports
        • Solution Briefs
          Product capabilities overview
      • Resources
        • Datasheets
          Product specifications
        • Infographics
          Visual data and statistics
        • Threat Reports
          SAP threat landscape analysis
        • The Defenders Digest
          Monthly security newsletter
      Threat Report

      SAP Cyber Attack Compromises Global Manufacturer

      Executive overview of a reported SAP cyber attack that severely impacted business operations.

      Read Now

      View all resources

  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
          Leaders in offensive SAP security research
        • RECON
          Remotely Exploitable Code On NetWeaver
        • CVE-2025-31324 & CVE-2025-42999
          The SAP zero-day that changed everything.
        • C2 Incident on SAP
          Anatomy of a command and control attack
        • CH4TTER
          Threat actors attacking SAP for profit
        • ICMAD
          Internet Communication Manager vulnerabilities
        • P4CHAINS
          P4CHAINS family of vulnerabilities
        • 10KBLAZE
          Critical security configuration risk
      Docuseries

      Hacking & Defending SAP Applications – Live

      We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

      Watch Now

      Subscribe to SAP Security Note Newsletter

  • CompanyExpand
      • Company
        • Leadership
          Meet our executives
        • Recognition
          Awards & accolades
        • Careers
          Join our team
        • News & Press
          View latest announcements
        • Partners
          Our partner ecosystem
        • Giving Back
          OneCares community engagement
        • Events
          Conferences & meetings
        • Contact Us
          Get in Touch
      Solution Brief

      10 Reasons Why More Companies Choose Onapsis

      Discover why leading enterprises tryst Onapsis to secure their most critical business applications

      Read More

  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Webinars

    CIO Insights: 4 Focus Areas for 2022

    Better understand the executive- and board-level conversations happening around business-critical application security and program blind spots. What are your CIO peers focusing on in 2022? What can CISOs, infosec leaders, and application owners do to support the office of the CIO?

    Read More CIO Insights: 4 Focus Areas for 2022Continue

  • Onapsis Webinar
    Webinars

    4 Reasons Why You Need Vulnerability Management

    A deep dive into the current environmental and business dynamics that your cybersecurity portfolio must account for. Understand the novel, emergent threats that the Onapsis Research Lab is observing and reporting on.

    Read More 4 Reasons Why You Need Vulnerability ManagementContinue

  • Webinars

    DevSecOps for SAP S/4HANA Migrations

    SAP S/4HANA migration projects are a huge undertaking involving your organization’s most mission-critical applications. Your business relies on these applications to function, so ensuring they stay secure, compliant, and available throughout migration and beyond is absolutely critical.

    Read More DevSecOps for SAP S/4HANA MigrationsContinue

  • Webinars

    Q&A Session with SAP & Onapsis: Active Cyberattacks on Mission-Critical SAP Applications

    Listen to a Q&A session with Richard Puckett, CISO at SAP and Mariano Nunez, CEO at Onapsis to discuss the key findings and actions to take to immediately protect your business.

    Read More Q&A Session with SAP & Onapsis: Active Cyberattacks on Mission-Critical SAP ApplicationsContinue

  • Webinars

    Executive Panel: The CISOs Role as a Leader in Digital Transformation

    Digital transformations promise efficiencies, customer satisfaction and new revenue opportunities, but they also vastly expand a company’s risk surface across new cloud, mobile applications and next-generation database technologies. CISOs must adapt their organizations to this new attack surface, or face the consequences.

    Read More Executive Panel: The CISOs Role as a Leader in Digital TransformationContinue

  • 5 Reasons Why You Need Vulnerability Management for Business-Critical Applications
    White Papers

    5 Reasons Why You Need Vulnerability Management for Business-Critical Applications

    Secure your business-critical applications. Here are five reasons why you need vulnerability management capabilities for SAP, Oracle, and other enterprise systems.

    Read More 5 Reasons Why You Need Vulnerability Management for Business-Critical ApplicationsContinue

  • Active Cyberattacks on Business-Critical SAP Applications
    Reports

    Active Cyberattacks on Business-Critical SAP Applications

    A critical cybersecurity blind spot impacting how many organizations protect their business-critical SAP applications is detailed in this joint report from Onapsis and SAP. Learn how threat actors are actively targeting these unprotected SAP applications.

    Read More Active Cyberattacks on Business-Critical SAP ApplicationsContinue

  • Webinars

    Onapsis Protecting Your Mission-Critical App: How to (Properly) Understand Your Risks

    Evaluate and quantify the value of solutions that are designed to help manage your risks and reduce your operational costs by establishing a proper understanding of risk. Watch this webinar to learn how to protect your mission-critical applications and more.

    Read More Onapsis Protecting Your Mission-Critical App: How to (Properly) Understand Your RisksContinue

  • Volume XVII: Remote Function Call: The Whole Picture
    Publications

    Volume XVII: Remote Function Call: The Whole Picture

    The aim of this publication is to fully introduce and explain the concept of Remote Function Call (RFC) and the impact on the Gateway and Message Server. We will focus not only on the importance of it, but also how to implement secure communication in your landscape. Onapsis strives to provide the most complete security…

    Read More Volume XVII: Remote Function Call: The Whole PictureContinue

Page navigation

Previous PagePrevious 1 … 33 34 35 36 37 … 44 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
Platform
Solutions
Resources
Threat Research
Company
Go Back
  • Platform
    • Assess
      Vulnerability management for SAP systems.
    • Defend
      Real-time SAP threat detection & response.
    • Control
      SAP transport analysis & code security.
    • Security Advisor
      AI-powered SAP security guidance.
  • Specialized Solutions
    • Onapsis for SAP BTP
      Purpose-built security for SAP Business Technology Platform.
    • Assess for SAP Success Factors
      Automated security for SAP SuccessFactors HR cloud apps.
    • Premium Add-Ons
      Enhance protection with premium tools & integrations.
Interactive

SAP Security & Compliance Evaluation

Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.

Start Now

Platform Overview

  • By Initiative
    • Accelerate SAP S/4HANA Transformations
      Secure your SAP S/4HANA migration from start to finish.
    • Achieve Automated Compliance
      Automate audits and continuous SAP compliance.
    • Cyber Resilience for RISE with SAP
      Secure your RISE with SAP cloud migration and deployment.
    • Incident Response
      Rapid response and forensics for SAP security breaches.
    • Strengthen DevSecOps
      Shift SAP security left to find flaws in custom ABAP code and BTP.
    • Threat Detection & Response
      Continuous threat monitoring to stop active SAP exploits.
    • Vulnerability Management
      Discover, prioritize, and remediate SAP vulnerabilities.
  • By Industry
    • Automotive Manufacturing
      Protect automotive SAP systems and supply chain data.
    • Financial Services
      Secure banking SAP systems to protect financial data.
    • Food & Beverage Manufacturing
      Secure food manufacturing ERP’s and ensure compliance
    • Government
      Secure public sector SAP systems against advanced threats.
    • Healthcare
      Protect critical healthcare ERP’s and patient data systems.
    • Heavy Manufacturing
      Protect industrial SAP systems and manufacturing uptime.
    • Oil & Gas
      Secure energy sector SAP systems and ensure uptime.
    • Pharmaceuticals
      Secure life science SAP systems, IP, and regulatory compliance.
    • Electric & Utilities
      Defend critical infrastructure and utility SAP systems.
    • Retail Manufacturing
      Secure retail SAP systems and protect supply chain data.
Webinar

Securing Your Future: Preparing for a Successful SAP RISE Transformation

Learn how to build cyber resilience during your SAP cloud migration journey.

Watch Now

  • Learn
    • Blog
      Expert insights and industry trends
    • Webinar
      Watch presentations on-demand
    • Videos
      Product demos and tutorials
    • Knowledge Articles
      Educational guides on core SAP security concepts
  • Read
    • Case Studies
      Real-world customer success stories
    • E-Books
      In-depth security guides
    • White Papers
      Research and analysis reports
    • Solution Briefs
      Product capabilities overview
  • Resources
    • Datasheets
      Product specifications
    • Infographics
      Visual data and statistics
    • Threat Reports
      SAP threat landscape analysis
    • The Defenders Digest
      Monthly security newsletter
Threat Report

SAP Cyber Attack Compromises Global Manufacturer

Executive overview of a reported SAP cyber attack that severely impacted business operations.

Read Now

View all resources

  • Threat Research
    • Onapsis Research Labs
      Leaders in offensive SAP security research
    • RECON
      Remotely Exploitable Code On NetWeaver
    • CVE-2025-31324 & CVE-2025-42999
      The SAP zero-day that changed everything.
    • C2 Incident on SAP
      Anatomy of a command and control attack
    • CH4TTER
      Threat actors attacking SAP for profit
    • ICMAD
      Internet Communication Manager vulnerabilities
    • P4CHAINS
      P4CHAINS family of vulnerabilities
    • 10KBLAZE
      Critical security configuration risk
Docuseries

Hacking & Defending SAP Applications – Live

We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.

Watch Now

Subscribe to SAP Security Note Newsletter

  • Company
    • Leadership
      Meet our executives
    • Recognition
      Awards & accolades
    • Careers
      Join our team
    • News & Press
      View latest announcements
    • Partners
      Our partner ecosystem
    • Giving Back
      OneCares community engagement
    • Events
      Conferences & meetings
    • Contact Us
      Get in Touch
Solution Brief

10 Reasons Why More Companies Choose Onapsis

Discover why leading enterprises tryst Onapsis to secure their most critical business applications

Read More

Customer Portal
Partner Portal

Contact Us