Please turn on your JavaScript for this page to function normally.
ERP applications under attack: How criminals target the crown jewels
Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …
SAP systems: The threat of insecure configurations
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
Most SAP systems vulnerable to critical security configuration risk
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
SAP closes critical vulnerability affecting TREX
SAP closed a critical vulnerability for an issue that was exposed for almost two years. The vulnerability (SAP Security Note 2419592) affects TREX, a SAP NetWeaver standalone …
Featured news
Sponsored
Don't miss
- GenAI can enhance security awareness training
- The relationship between cybersecurity and work tech innovation
- eBook: Cloud security skills
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)