Onapsis Research Labs

4 results

  1. SecurityBridge and CyberSafe

    Inside a C2 Attack: Unraveling SAP System Breaches

    Reading time: 2 mins

    As SAP applications store valuable data, they are becoming increasingly attractive targets for threat actors, who exploit vulnerabilities for profit. It is crucial for companies to strengthen cybersecurity measures for SAP to prevent future attacks. A recent research by Onapsis and Flashpoint reveals that discussions about SAP vulnerabilities and exploits have surged significantly, indicating growing…

  2. cybersecurity

    ERP Security for Utility Companies – Onapsis Partners with SNOPUD to Secure Critical SAP Applications

    Reading time: 2 mins

    Cyberattacks on utility companies are increasingly targeting vulnerabilities in SAP applications, posing significant financial and operational risks, with the average cost of a data breach reaching $4.72 million. The energy sector, with its sensitive enterprise resource planning (ERP) systems like SAP, is particularly attractive to cybercriminals. Despite this, many utility companies struggle to allocate adequate…

  3. Augmenting Existing SAP Network Security with Onapsis

    Reading time: 2 mins

    A recent study by Onapsis highlights a 400% rise in ransomware incidents targeting SAP systems, emphasizing the critical need for enhanced security measures to protect these applications. SAP offers various security features, including user authentication, encryption, and monitoring controls like SAProuter. However, if compromised, SAProuter can be an entry point for unauthorized access. Traditional vulnerability…

  4. Upgrading SAP Security with Onapsis Research Labs

    Reading time: 2 mins

    The most common cybersecurity threats include ransomware attacks, unpatched systems, and compromised security credentials. While ransomware represents external threats, unpatched systems and compromised credentials signify internal lapses that require immediate attention. Many IT teams lack the necessary cybersecurity skills and resources, especially in complex SAP environments where breaches can lead to significant financial and reputational…