Please turn on your JavaScript for this page to function normally.
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101227/sap-400x200.jpg)
ERP applications under attack: How criminals target the crown jewels
Business-critical applications running the biggest organizations in the world are under attack, according to research from Digital Shadows and Onapsis. The report shows a rise …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101224/sap2-400x200.jpg)
SAP systems: The threat of insecure configurations
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
![SAP](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101227/sap-400x200.jpg)
Most SAP systems vulnerable to critical security configuration risk
Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a …
![sap](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113936/sap-400x200.jpg)
SAP closes critical vulnerability affecting TREX
SAP closed a critical vulnerability for an issue that was exposed for almost two years. The vulnerability (SAP Security Note 2419592) affects TREX, a SAP NetWeaver standalone …
Featured news
Resources
Don't miss
- 6 considerations for 2025 cybersecurity investment decisions
- BlackLock ransomware onslaught: What to expect and how to fight it
- Cybercriminals shift focus to social media as attacks reach historic highs
- The risks of autonomous AI in machine-to-machine interactions
- Balancing cloud security with performance and availability