Onapsis and SAP partnered on the discovery and mitigation of a set of critical vulnerabilities affecting SAP applications actively using the SAP Internet Communication Manager (ICM) component. Read along for five things you should know about the ICMAD vulnerabilities.
Onapsis Research Labs discovered a set of extremely critical vulnerabilities affecting SAP applications actively using the SAP Internet Communication Manager (ICM) component. This discovery requires immediate attention by most SAP customers.
Onapsis CEO Mariano Nunez weighs in on Binding Operational Directive 22-01 which recommends urgent and prioritized remediation of known exploited vulnerabilities in software and applications and establishes requirements for federal civilian agencies to remediate these vulnerabilities.
This blog post’s main purpose is to help SAP Security administrators better understand how to review their SAP systems in response to CISA BOD 22-01. It details each vulnerability highlighted by CISA’s catalog of known exploited SAP vulnerabilities and provides guidance on steps to take.
Meet Onapsis at Black Hat 2021 for a training session on a complete approach for both Offensive and Defensive of SAP systems.
We are very excited to announce a brand new, joint go-to-market effort between SAP and Onapsis to launch an integration between SAP Process Control and Onapsis Comply.
You're probably here because you don’t know this term fairly intimately, but you most likely will before long because it’s the name of the enterprise resource planning (ERP) platform from the German software giant SAP®. ERP software is what SAP is best known for, and SAP S/4HANA is the latest and greatest version of its popular ERP product.
06/04/2021 | By |
According to threat intelligence issued by SAP and Onapsis, there’s a critical cybersecurity blind spot impacting how many organizations protect their mission-critical SAP applications. At the same time, it’s clear that threat actors are active, capable, and widespread.
During our recent webinar covering our threat report, we received a lot of great questions from attendees. In this post, we are going to address some of the questions that were asked in the live session.