Ransomware continues to be one of the top varieties of malicious software. And it’s wreaking havoc, grinding company operations to a halt as the ransomware renders mission-critical data and systems inaccessible, while also exposing companies to huge...
Jun 14, '23 by Joerg Schneider-Simon
Hackers have been quick to notice that many SAP applications, servers, and databases that were once hidden behind corporate firewalls are now exposed to the web, making them prime targets for attacks.
One common denominator in this push to the web...
Apr 25, '23 by Joerg Schneider-Simon
The world faces a set of risks that feel both wholly new and eerily familiar. The Global Risks Report 2023, published by the World Economic Forum (WEF), explores some of the most severe risks we face over the next decade.
As you can see from the...
Feb 28, '23 by Joerg Schneider-Simon
Talk to your average hacker, and they’ll tell you they prefer to target networks and applications that host mission-critical data.
The more valuable the data, the more attractive the target.
This is why plenty of cybercriminals have their sights set...
Feb 13, '23 by Joerg Schneider-Simon
Retailers face multiple (and growing) challenges in a highly competitive marketplace. To meet these challenges, many retailers turn to SAP to transform the customer experience across every channel while improving sustainability across the entire...
Dec 15, '22 by Joerg Schneider-Simon
Hackers know there is an open door into SAP. They exploit users and the application layer by introducing malicious files. This attack vector is in the application’s critical path, as attaching supporting documents to transactions is a common...
Apr 20, '22 by Joerg Schneider-Simon
If Benjamin Franklin were alive today, he would likely expand his famous aphorism to say: “There are only three certainties in life—death and taxes—and malware.”
Malware is a certainty in life and business because there is no way to protect your...
Apr 12, '22 by Joerg Schneider-Simon
This post is the second in our two-part series on how to protect your SAP systems against file-based attacks. Read the first post: SAP Security for Beginners: How to Safely Upload Files into Your SAP System.
Malware in file uploads wreaks havoc on...