Tag: sap
-
TCS Expands SAP Partnership to Drive Cloud Migration and AI-Powered Transformation
First seen on scworld.com Jump to article: www.scworld.com/news/tcs-expands-sap-partnership-to-drive-cloud-migration-and-ai-powered-transformation
-
Sicherheitslücke ermöglicht Systemkontrolle – Notfallpatch für kritische Zero-Day-Schwachstelle in SAP NetWeaver
First seen on security-insider.de Jump to article: www.security-insider.de/kritische-sicherheitsluecke-sap-netweaver-notfall-patch-a-0ea1dd66a85bfdbb1f30565bc8b6ef22/
-
U.S. CISA adds SAP NetWeaver flaw to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SAP NetWeaver flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added SAP NetWeaver flaw, tracked as CVE-2025-31324, to its Known Exploited Vulnerabilities (KEV) catalog. Last week, researchers warned that a zero-day vulnerability, tracked asCVE-2025-31324(CVSS score of 10/10), in SAP NetWeaver is…
-
Over 400 servers found to be exposed to SAP NetWeaver bug
First seen on scworld.com Jump to article: www.scworld.com/news/over-400-servers-found-to-be-exposed-to-sap-netweaver-bug
-
SAP NetWeaver Visual Composer Flaw Under Active Exploitation
CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/sap-netweaver-visual-composer-flaw-active-exploitation
-
Threat Actors Hacking SAP Critical Zero-Day
Unauthenticated Hackers Exploit CVE-2025-31324 to Upload Webshells. Threat actors are exploiting a zero-day flaw in a partially deprecated SAP tool still widely used by governments and businesses. On Friday, SAP’s security division, Onapsis, disclosed that CVE-2025-31324 is actively exploited in the wild. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/threat-actors-hacking-sap-critical-zero-day-a-28098
-
Over 1,200 SAP NetWeaver servers vulnerable to actively exploited flaw
Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload vulnerability that allows attackers to hijack servers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/over-1-200-sap-netweaver-servers-vulnerable-to-actively-exploited-flaw/
-
Breaking Down CVE-2025-31324 A Clear Threat to SAP Business Operations
When a vulnerability is rated 9.9 out of 10 on the CVSS scale, it deserves immediate attention. CVE-2025-31324 affects SAP NetWeaver AS Java, a platform many businesses rely on every… The post Breaking Down CVE-2025-31324 A Clear Threat to SAP Business Operations appeared first on Strobes Security. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/04/breaking-down-cve-2025-31324-a-clear-threat-to-sap-business-operations/
-
SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells
SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This vulnerability, with a maximum CVSSv3 severity score of 10.0, stems from a missing authorization check within the Metadata Uploader module of Visual Composer. When exploited, it allows unauthenticated attackers to upload arbitrary malicious files via specially crafted POST requests to…
-
âš¡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed with powerful tools that do the heavy lifting, from AI-powered phishing kits to large botnets ready to strike. And they’re not just after big corporations. Anyone can be a target when fake identities, hijacked infrastructure, and insider tricks…
-
SAP NetWeaver: New vulnerability of highest criticality disclosed
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/sap-netweaver-vulnerability-disclosed
-
SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells
A critical vulnerability (CVE-2025-31324) in SAP NetWeaver Visual Composer puts systems at risk of full compromise. Learn how… First seen on hackread.com Jump to article: hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/
-
Emergency patch for potential SAP zero-day that could grant full system control
German software giant paywalls details, but experts piece together the clues First seen on theregister.com Jump to article: www.theregister.com/2025/04/25/sap_netweaver_patch/
-
SAP Fixes Critical Vulnerability After Evidence of Exploitation
A maximum severity flaw affecting SAP NetWeaver has been exploited by threat actors First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/sap-fixes-critical-vulnerability/
-
Die Bösen kooperieren, die Guten streiten sich
Tags: ciso, compliance, cyber, cyberattack, cyersecurity, finance, group, microsoft, resilience, sap, strategy, usaEine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu einer stärkeren Zusammenarbeit und Harmonisierung der Cybersicherheitsvorschriften zu bewegen.Da Cyberangriffe immer weiter zunehmen und internationale Banden vermehrt miteinander kooperieren, bedarf es einer stärkeren, grenzüberschreitenden Zusammenarbeit der ‘Guten”. Das zumindest behaupten Führungskräfte namhafter Unternehmen wie Salesforce, Microsoft, AWS, Mastercard, SAP…
-
SAP fixes suspected Netweaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sap-fixes-suspected-netweaver-zero-day-exploited-in-attacks/
-
Critical SAP NetWeaver Flaw (CVE-2025-31324) Actively Exploited
A critical security flaw in SAP NetWeaver’s Visual Composer component, identified as CVE-2025-31324, has been actively exploited by threat actors. This vulnerability allows unauthenticated attackers to upload malicious files, leading to potential full system compromise. SAP has released a patch… First seen on sensorstechforum.com Jump to article: sensorstechforum.com/cve-2025-31324-actively-exploited/
-
Only 3,000 staff jump from SAP after 10,000 earmarked to be pushed
Tags: sapCFO says ‘a cushion of several thousand employees we can play with’ is a good thing in uncertain times First seen on theregister.com Jump to article: www.theregister.com/2025/04/23/sap_staff_cuts/
-
SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment
Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of SAP NetWeaver, the widely deployed enterprise integration platform. Attackers have leveraged an unreported 0-day vulnerability to deploy web shells, which give them remote command execution capabilities and persistent backdoor access even on fully patched systems. CVE Details The exposure centers around…
-
SAP Patchday April 2025 – Kritische Sicherheitslücke in SAP S/4HANA fungiert als Hintertür
First seen on security-insider.de Jump to article: www.security-insider.de/sap-patchday-april-2025-a-d14d9ec8362222d02156c2ba66f4d4ce/
-
Top 16 OffSec, pen-testing, and ethical hacking certifications
Tags: access, android, antivirus, application-security, attack, authentication, blockchain, bug-bounty, business, cisco, cloud, computing, credentials, crypto, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, guide, hacker, hacking, incident response, injection, iot, jobs, kali, linux, malware, microsoft, mitigation, mobile, network, penetration-testing, RedTeam, remote-code-execution, reverse-engineering, risk, risk-assessment, sap, skills, sql, technology, threat, tool, training, update, vulnerability, windowsExperiential learning Offensive security can’t be fully mastered through lectures alone. Candidates need hands-on training in lab environments to develop practical skills. Ideally, certification exams should include a practical assessment, such as developing an exploit to compromise a system.Because individuals learn OffSec techniques, such as penetration testing, in different ways, the most effective certifications offer…
-
SAP Patches Critical Code Injection Vulnerabilities
SAP released 20 security notes on April 2025 patch day, including three addressing critical code injection and authentication bypass flaws. The post SAP Patches Critical Code Injection Vulnerabilities appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/sap-patches-critical-code-injection-vulnerabilities/
-
4 ways to protect business-critical SAP applications
First seen on scworld.com Jump to article: www.scworld.com/perspective/4-ways-to-protect-business-critical-sap-applications
-
Updated KEV Catalog From CISA Includes Edimax, NAKIVO, and SAP NetWeaver Bugs
First seen on scworld.com Jump to article: www.scworld.com/brief/updated-kev-catalog-from-cisa-includes-edimax-nakivo-and-sap-netweaver-bugs
-
Updated CISA vulnerabilities catalog includes Edimax, NAKIVO, SAP NetWeaver bugs
First seen on scworld.com Jump to article: www.scworld.com/brief/updated-cisa-vulnerabilities-catalog-includes-edimax-nakivo-sap-netweaver-bugs

