{"id":902,"date":"2021-10-05T16:22:37","date_gmt":"2021-10-05T16:22:37","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=902"},"modified":"2021-12-07T10:28:19","modified_gmt":"2021-12-07T10:28:19","slug":"active-cyberattacks-on-business-critical-sap-applications","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/","title":{"rendered":"Active Cyberattacks on Business-Critical SAP Applications"},"content":{"rendered":"<h2>SAP and Onapsis partner to release new threat intelligence on active threats<\/h2>\n<h4><strong>Defend your Business-Critical SAP Applications from Active Threats<\/strong><\/h4>\n<div class=\"span6 widget-span widget-type-custom_widget\" data-widget-type=\"custom_widget\" data-x=\"0\" data-w=\"6\">\n<div id=\"hs_cos_wrapper_module_1544441313027872\" class=\"hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module widget-type-rich_text widget-type-rich_text\" data-hs-cos-general-type=\"widget\" data-hs-cos-type=\"module\">\n<div class=\"elementor-element elementor-element-255a32d elementor-widget elementor-widget-text-editor\" data-id=\"255a32d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p>On April 6, Onapsis and SAP released a\u00a0new threat intelligence report to help SAP customers protect from active cyber threats seeking to specifically target, identify and compromise organizations running unprotected SAP applications, through a variety of cyberattack vectors.\u00a0<strong>SAP and Onapsis strongly advise organizations to take immediate action<\/strong>\u00a0including swift application of the relevant SAP security patches and a thorough review of security configurations of their SAP landscapes, as well as performing a compromise assessment and forensic investigation of at-risk environments.<\/p>\n<p>Download this paper from Onapsis to find out more&#8230;<\/p>\n<p>[dlm_gf_form download_id=899 ajax=&#8221;true&#8221;]<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>SAP and Onapsis partner to release new threat intelligence on active threats Defend your Business-Critical SAP Applications from Active Threats&#8230;<\/p>","protected":false},"author":25,"featured_media":904,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,16,31],"tags":[],"class_list":["post-902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-finance","category-information-technology","category-onapsis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Active Cyberattacks on Business-Critical SAP Applications - Techknowledge<\/title>\n<meta name=\"description\" content=\"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Active Cyberattacks on Business-Critical SAP Applications - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-05T16:22:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-07T10:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png\" \/>\n\t<meta property=\"og:image:width\" content=\"296\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/\",\"url\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/\",\"name\":\"Active Cyberattacks on Business-Critical SAP Applications - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png\",\"datePublished\":\"2021-10-05T16:22:37+00:00\",\"dateModified\":\"2021-12-07T10:28:19+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"description\":\"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png\",\"width\":296,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brands\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Onapsis\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Active Cyberattacks on Business-Critical SAP Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Active Cyberattacks on Business-Critical SAP Applications - Techknowledge","description":"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/","og_locale":"de_DE","og_type":"article","og_title":"Active Cyberattacks on Business-Critical SAP Applications - Techknowledge","og_description":"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS","og_url":"https:\/\/b2btechknowledge.net\/de\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/","og_site_name":"Techknowledge","article_published_time":"2021-10-05T16:22:37+00:00","article_modified_time":"2021-12-07T10:28:19+00:00","og_image":[{"width":296,"height":410,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png","type":"image\/png"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Steph Napier","Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/","url":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/","name":"Active Cyberattacks on Business-Critical SAP Applications - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png","datePublished":"2021-10-05T16:22:37+00:00","dateModified":"2021-12-07T10:28:19+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"description":"Active Cyberattacks on Business-Critical SAP Applications from Onapsis. The latest Threat Intelligence Report from a world leader in IS","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Active-Cyberattacks-on-Business-Critical-SAP-Applications-e1633528285673.png","width":296,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/brands\/onapsis\/active-cyberattacks-on-business-critical-sap-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Brands","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/"},{"@type":"ListItem","position":3,"name":"Onapsis","item":"https:\/\/b2btechknowledge.net\/topics\/brands\/onapsis\/"},{"@type":"ListItem","position":4,"name":"Active Cyberattacks on Business-Critical SAP Applications"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=902"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/902\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/904"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}