SAP and Onapsis proactively notify customers on active cyber threats

SAP and Onapsis proactively notify customers on active cyber threats

Together with SAP, Onapsis released a new threat intelligence report to help SAP customers protect from active cyber attacks.

Learn more about it here >>

 

Live Q&A Session

Attend a live Q&A session with Richard Puckett, CISO, SAP and Mariano Nunez, CEO, Onapsis to discuss the key findings and actions to take immediately to protect your business, click here

 

Press releases

 

DEFEND YOUR MISSION-CRITICAL SAP APPLICATIONS FROM ACTIVE THREATS

On April 6, Onapsis and SAP released a new threat intelligence report to help SAP customers protect from active cyber threats seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors. SAP and Onapsis strongly advise organizations to take immediate action including swift application of the relevant SAP security patches and a thorough review of security configurations of their SAP landscapes, as well as performing a compromise assessment and forensic investigation of at-risk environments.

The U.S. Department of Homeland Security’s CISA and Germany’s Federal Office for Information Security (BSI) have also developed and released alerts and notifications on this matter.

SAP promptly patched all of the critical vulnerabilities observed being exploited, and have made them available to customers for months, and years in some cases. Unfortunately, SAP and Onapsis continue to observe many organizations that have still not applied the relevant mitigations, allowing unprotected SAP systems to continue to operate and, in many cases, remain visible to attackers via the internet.

We highly encourage you to download the threat report to assess if you are at risk, and which actions to take immediately to protect your business. This report also details the specific techniques, tools and procedures (TTPs) observed by our experts, empowering defenders to respond to this activity as quickly as possible.

Download threat report >>