Security News
![Majority of SAP attacks take place using three common techniques (ZDNet)](/static/build/img/news/alt/data-breach-stats-small.jpg)
![Majority of SAP Attacks Use One of Three Common Techniques (SecurityWeek)](/static/build/img/news/alt/DDoS-small.jpg)
![3 Ways Attackers Will Own Your SAP (Dark Reading)](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
![Login Vulnerability Exposes SAP ASE Databases (SecurityWeek)](/static/build/img/news/alt/web-statistics-2-small.jpg)
![BlackHat talk hibernated over 0-day in SAP's Afaria mobile manager (The Register)](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![Addressing on the job training for those who work with SAP (IT Toolbox Blogs)](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
![SAP admits - shock! - it sells to governments, denies that means backdoors (The Register)](/static/build/img/news/alt/breach-statistics-small.jpg)
![SAP denies backdoors, defends its software used in government (ZDNet)](/static/build/img/news/alt/Phishing-small.jpg)
![The challenge of mass material creation in SAP (IT Toolbox Blogs)](/static/build/img/news/alt/ransomware-statistics-small.jpg)
![Critical vulnerabilities affecting SAP business critical apps (Help Net Security)](/static/build/img/news/alt/hackers-statistics-small.jpg)
2015-02-27 07:52
Onapsis released five security advisories detailing vulnerabilities in SAP BusinessObjects and SAP HANA enterprise software. Included in the security advisories are three high risk vulnerabilities, on...
Onapsis released five security advisories detailing vulnerabilities in SAP BusinessObjects and SAP HANA enterprise software. Included in the security advisories are three high risk vulnerabilities, on...