Meet Onapsis at Black Hat 2021 for a training session on a complete approach for both Offensive and Defensive of SAP systems.
We are very excited to announce a brand new, joint go-to-market effort between SAP and Onapsis to launch an integration between SAP Process Control and Onapsis Comply.
You're probably here because you don’t know this term fairly intimately, but you most likely will before long because it’s the name of the enterprise resource planning (ERP) platform from the German software giant SAP®. ERP software is what SAP is best known for, and SAP S/4HANA is the latest and greatest version of its popular ERP product.
06/04/2021 | By |
According to threat intelligence issued by SAP and Onapsis, there’s a critical cybersecurity blind spot impacting how many organizations protect their mission-critical SAP applications. At the same time, it’s clear that threat actors are active, capable, and widespread.
During our recent webinar covering our threat report, we received a lot of great questions from attendees. In this post, we are going to address some of the questions that were asked in the live session.
Welcome to the final installment of our series on the Dangers in SAP Transport Management. In our final post, we’ll focus on how an attacker could leverage logical file names and logical OS commands within SAP transports to access, modify and exfiltrate data.
Leveraging our Partner Ecosystem to Quickly Respond to Active Cyber Threats Targeting Mission-Critical SAP Applications
Recently, Onapsis and SAP released research that provides conclusive evidence that the impact and probability of attacks on unprotected SAP applications is putting organizations at extremely high risk.
Onapsis and SAP are releasing a new threat intelligence alert and detailed report to help SAP customers protect themselves from active cyber threats seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors.