Skip to content
Onapsis
  • PlatformExpand
      • Platform
        • Assess
        • Defend
        • Onapsis for SAP BTP
        • Control
        • Assess for SAP Success Factors
        • Security Advisor
        • Premium Add-Ons
      Request a demo
      Onapsis Webinar
      Webinars

      Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management

      WATCH NOW Safeguarding Tomorrow: Empowering SAP Customers with Advanced Cyber Risk Management
  • SolutionsExpand
      • Solutions
        • By Initiative
          • Accelerate SAP S/4HANA Transformations
          • Achieve Automated Compliance
          • Building Cyber Resilience for RISE with SAP
          • Incident Response
          • Secure SAP Cloud Migration & Operation
          • Strengthen DevSecOps
          • Strengthen SAP Security for NIS2 Compliance
          • Threat Detection & Response
          • Vulnerability Management
        • By Industry
          • Financial Services
          • Food & Beverage Manufacturing
          • Government
          • Healthcare
          • Heavy Manufacturing
          • Industrial Chemicals
          • Pharmaceuticals
          • Electric & Utilities
          • Oil & Gas
          • Personal Care Manufacturing
          • Retail Manufacturing
      Onapsis Webinar
      Webinars

      Securing Your Future: Preparing for a Successful SAP RISE Transformation

      WATCH NOW Securing Your Future: Preparing for a Successful SAP RISE Transformation
  • ResourcesExpand
      • Resources
        • Blog
        • Case Studies
        • Datasheets
        • eBooks
        • Infographics
        • Knowledge Articles
        • Podcasts
        • Publications
        • Security Advisories
        • Solution Briefs
        • Threat Reports
        • Videos
        • Webinars
        • White Papers
      Subscribe To Our Newsletter
      Datasheets

      Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer

      READ NOW Executive Threat Overview: Reported SAP Cyber Attack Severely Impacts Business Operations, Compromises Data at Global Manufacturer
  • Threat ResearchExpand
      • Threat Research
        • Onapsis Research Labs
        • CVE-2025-31324 & CVE-2025-42999
        • CH4TTER
        • C2 Incident on SAP
        • P4CHAINS
        • ICMAD
        • RECON
        • 10KBLAZE
      Watch The Defenders Digest
      Onapsis Webinar
      Webinars

      Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)

      WATCH NOW Critical SAP Zero-Day Vulnerability Under Active Exploitation (CVE-2025-31324)
  • CompanyExpand
      • Company
        • Partners
        • Giving Back
        • Leadership
        • Careers
        • Events
        • News & Press
        • Recognition
        • Contact Us
      Subscribe to Our Newsletter
      Solution Briefs

      10 Reasons Why More Companies Choose Onapsis

      READ MORE 10 Reasons Why More Companies Choose Onapsis
  • LoginExpand
    • Customer Portal
    • Partner Portal
Contact Us
Onapsis
Search
  • Onapsis CEO Mariano Nunez interviewed by Richard Stiennon
    Videos

    Onapsis CEO Mariano Nunez interviewed by Richard Stiennon

    IT Harvest 2015 Video Interview Series. San Francisco, CA.

    Read More Onapsis CEO Mariano Nunez interviewed by Richard StiennonContinue

  • Volume IX: Assessing and Defending SAP BusinessObjects
    Publications

    Volume IX: Assessing and Defending SAP BusinessObjects

    Implementing proper security controls for a BusinessObjects implementation is a complex process. There are a number of moving parts, complicated Access Controls, and many client access points. For those tasked with auditing an implementation it can be difficult to know where to begin. In this white paper we discuss the BusinessObjects architecture landscape, discuss common…

    Read More Volume IX: Assessing and Defending SAP BusinessObjectsContinue

  • Volume VIII: Transport Management System – Highway to Production
    Publications

    Volume VIII: Transport Management System – Highway to Production

    In all SAP implementations there are many reasons why organizations would need to make changes and updates on a regular basis; from changes to legislation and compliance mandates to business growth, process evolution and security modifications. The Transport Management System (TMS) is the backbone for applying these changes to our SAP Systems. Each of the…

    Read More Volume VIII: Transport Management System – Highway to ProductionContinue

  • Volume VII: Preventing Cyber-attacks Against SAP Solution Manager
    Publications

    Volume VII: Preventing Cyber-attacks Against SAP Solution Manager

    By design the SAP Solution Manager is connected to all SAP systems (i.e. ERP, CRM, BI, etc), making it a critical component of any SAP implementation: if successfully exploited by an attacker, all the satellite SAP environments, and therefore their business information, could be completely compromised. Despite its relevance, common IT security practices have traditionally…

    Read More Volume VII: Preventing Cyber-attacks Against SAP Solution ManagerContinue

  • Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications
    Publications

    Volume V: Our Crown Jewels Online – Attacks targeting SAP Web Applications

    While the comment, SAP platforms are only accessible internally, was true in many organizations more than a decade ago, today, driven by modern business requirements for interconnectivity, SAP systems are very often connected to the Internet. This scenario dramatically increases the universe of possible attackers, as malicious attackers can remotely try to compromise the organization’s…

    Read More Volume V: Our Crown Jewels Online – Attacks targeting SAP Web ApplicationsContinue

  • Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java Solutions
    Publications

    Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java Solutions

    SAP Application Servers Java, supported by the J2EE Engine, serve as the base framework for running critical solutions such as the SAP Enterprise Portal, SAP Exchange Infrastructure (XI), SAP Process Integration (PI) and SAP Mobile Infrastructure (MI). In addition, customers can also deploy their own custom Java applications on these platforms. In December 2010, SAP…

    Read More Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java SolutionsContinue

  • Volume II: SAP Knowledge Management – The Risks of Sharing
    Publications

    Volume II: SAP Knowledge Management – The Risks of Sharing

    SAP Knowledge Management (SAP KM) is a central component of the SAP Enterprise Portal, enabling the information extracted from numerous data sources within the Organization to be displayed in a single access point. Employees, customers, vendors and business partners use this platform to interact with data provided by the company in order to fulfill their…

    Read More Volume II: SAP Knowledge Management – The Risks of SharingContinue

  • Volume I: The Risks of Downwards Compatibility
    Publications

    Volume I: The Risks of Downwards Compatibility

    SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would…

    Read More Volume I: The Risks of Downwards CompatibilityContinue

  • Trust, but Verify: Protecting Your Business-Critical Applications
    Videos

    Trust, but Verify: Protecting Your Business-Critical Applications

    Levi Strauss’s Deputy CISO, Steve Zalewski discusses the concept of “trust, but verify” when undergoing digital transformation projects and working with both vendors and third-party security providers.

    Read More Trust, but Verify: Protecting Your Business-Critical ApplicationsContinue

Page navigation

Previous PagePrevious 1 … 39 40 41 42 Next PageNext
Onapsis
  • CUSTOMER PORTAL
  • PARTNER PORTAL
  • ONAPSIS FOR SAP
  • ONAPSIS FOR ORACLE
  • SECURITY ADVISORIES
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Company
    • About Onapsis
    • Partners
    • Onapsis Cares
    • Leadership
    • Careers
    • Events
    • News & Press
    • Recognition
    • Contact Us
  • Resources
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • The Defenders Digest
  • Threat Research
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
  • Solutions
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Stärken Sie die SAP-Sicherheit für NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Platform
  • Solutions
  • Resources
  • Threat Research
  • Company

The Defenders Digest

  • Sitemap
  • Terms of Use
  • Privacy Policy
  • Quality Policy
  • Disclosure Policy
  • Security Vulnerability Reporting Guidelines
  • ©2025 Onapsis
  • All rights reserved
Onapsis Linkedin
Onapsis Twitter
Onapsis Youtube
Onapsis Facebook
  • Platform
    • Platform Overview
    • Assess
    • Onapsis for SAP BTP
    • Assess for SAP Success Factors
    • Defend
    • Control
    • Premium Add-Ons
    • Security Advisor
  • Solutions
    • Solutions Overview
    • By Initiative
      • Accelerate SAP S/4HANA Transformations
      • Achieve Automated Compliance
      • Building Cyber Resilience for RISE with SAP
      • Incident Response
      • Secure SAP Cloud Migration & Operation
      • Strengthen DevSecOps
      • Strengthen SAP Security for NIS2 Compliance
      • Threat Detection & Response
      • Vulnerability Management
    • By Industry
      • Industries Overview
      • Financial Services
      • Food & Beverage Manufacturing
      • Government
      • Healthcare
      • Heavy Manufacturing
      • Industrial Chemicals
      • Pharmaceuticals
      • Electric & Utilities
      • Oil & Gas
      • Personal Care Manufacturing
      • Retail Manufacturing
  • Resources
    • Resources Overview
    • Blog
    • Case Studies
    • Datasheets
    • eBooks
    • Infographics
    • Knowledge Articles
    • Podcasts
    • Publications
    • Security Advisories
    • Solution Briefs
    • Threat Reports
    • Videos
    • Webinars
    • White Papers
    • Watch the Defenders Digest
  • Threat Research
    • Threat Research Overview
    • Onapsis Research Labs
    • Zero-Day: CVE-2025-31324
    • CH4TTER
    • C2 Incident on SAP
    • P4CHAINS
    • ICMAD
    • RECON
    • 10KBlaze
  • Company
    • Company Overview
    • Become a Partner
    • Giving Back
    • Leadership
    • Careers
    • Events
    • News & Press
    • Contact Us
    • Recognition
Customer Portal
Partner Portal

Contact Us