As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
Following the public exploit release for CVE-2025-31324, this advisory provides new analysis on the latest wave of attacks. See our full breakdown of new webshells, attacker TTPs, and vital next steps to secure your SAP systems.
A new exploit for CVE-2025-31324 has been made public as of August 15, 2025. Here is what defenders need to know and how to take action to ensure systems are protected.
Stay protected this summer with essential cybersecurity tips. Learn how to stay safe online during holidays and weekends.
Explore critical SAP Security Notes & CVEs from 2025. Get Onapsis’s analysis on deserialization vulnerabilities, zero-day exploits like CVE-2025-31324, and essential remediation steps.
Security notes from this July Patch Tuesday that belong to a very dangerous class of vulnerability (CWE-502: Deserialization of Untrusted Data (4.17).
SAP warned organizations about the active exploitation of CVE-2025-31324 on April 24, 2025. Here is the information you need to know about protecting your SAP applications.
SAP systems are high-value targets—are yours secure? Discover the top 5 SAP security risks and practical steps to mitigate them before attackers strike.
Onapsis, in collaboration with Mandiant, is releasing an open source tool to help organizations identify Indicators of Compromise (IoCs) associated with active in-the-wild exploitation of a recently patched vulnerability in SAP NetWeaver Application Server Java (CVE-2025-31324). CVE-2025-31324 is a critical unauthenticated remote code execution vulnerability in the Visual Composer component of SAP NetWeaver, allowing threat…
Learn how utilities can build resilience against cyberattacks with proactive vulnerability management to safeguard essential infrastructure and services.