As a key SAP security researcher at Onapsis, Thomas Fritsch is a trusted authority on vulnerability management and emerging threats. Leveraging his extensive career as an SAP expert, he focuses on deeply technical areas like SAP system configuration and transport management. Thomas’s analysis of the latest SAP security patches and vulnerabilities is a core component of the research that provides the in-depth, actionable intelligence organizations need to protect their systems. His role as a respected speaker and publisher further establishes him as a definitive voice in the SAP cybersecurity space, helping to bridge the gap between complex research and real-world security practices.
This blog post will explain the main aspects of Unified Connectivity Framework (UCON) and how it can be used to decrease the attack surface for malicious RFC calls by 95%.
SAP development systems are an often underestimated entry point for attacks.
SAP released 14 new and updated SAP security patches for its November SAP Patch Day. Onapsis Research Labs contributed to fixing three new SAP vulnerabilities.
Password hash cracking, user cloning, and user impersonation are realistic attack scenarios in SAP systems. This blog post explains how SAP customers can protect their systems.
SAP’s October Patch Day includes two HotNews notes with a high CVSS score in SAP Manufacturing Execution and SAP Commerce, along with multiple updated notes in SAP Business Objects.
SAP Patch Day for September 2022 includes 16 new and updated Security Notes (including the notes that were released or updated since last Patch Tuesday).
This blog discusses technical considerations in SAP Change and Transport Systems to adhere to audit requirements.
SAP has published 11 new and updated Security Notes on its August Patch Day. SAP has patched three Information Disclosure vulnerabilities in SAP BusinessObjects (BO) which affect different components of the application.
The Table Change Logging feature in SAP provides options to track changes to individual tables and simple customized objects. Learn more about The Onapsis Platform for SAP security and how we’re supporting SAP customers in monitoring all important aspects of Table Change Logging.
Discover your SAP security maturity with our new interactive self-assessment. Get personalized recommendations.
Start Now
Learn how to build cyber resilience during your SAP cloud migration journey.
Watch Now
Executive overview of a reported SAP cyber attack that severely impacted business operations.
Read Now
We are bridging the gap between theoretical risk and practical defense, directly sourced from our experience on the SAP cybersecurity front lines.
Watch Now
Discover why leading enterprises tryst Onapsis to secure their most critical business applications
Read More