As a key SAP security researcher at Onapsis, Thomas Fritsch is a trusted authority on vulnerability management and emerging threats. Leveraging his extensive career as an SAP expert, he focuses on deeply technical areas like SAP system configuration and transport management. Thomas’s analysis of the latest SAP security patches and vulnerabilities is a core component of the research that provides the in-depth, actionable intelligence organizations need to protect their systems. His role as a respected speaker and publisher further establishes him as a definitive voice in the SAP cybersecurity space, helping to bridge the gap between complex research and real-world security practices.
This SAP Patch Day blog for December 2022 addresses SAP NetWeaver Process Integration & other Security Notes.
This blog explains SAP RFC Callbacks and how to protect your SAP systems.
This blog post will explain the main aspects of Unified Connectivity Framework (UCON) and how it can be used to decrease the attack surface for malicious RFC calls by 95%.
SAP development systems are an often underestimated entry point for attacks.
SAP released 14 new and updated SAP security patches for its November SAP Patch Day. Onapsis Research Labs contributed to fixing three new SAP vulnerabilities.
Password hash cracking, user cloning, and user impersonation are realistic attack scenarios in SAP systems. This blog post explains how SAP customers can protect their systems.
SAP’s October Patch Day includes two HotNews notes with a high CVSS score in SAP Manufacturing Execution and SAP Commerce, along with multiple updated notes in SAP Business Objects.
SAP Patch Day for September 2022 includes 16 new and updated Security Notes (including the notes that were released or updated since last Patch Tuesday).
This blog discusses technical considerations in SAP Change and Transport Systems to adhere to audit requirements.