By Christoph Nagy, CEO of SecurityBridge
To detect attacks on SAP, you need to evaluate the security logs in SAP.
While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we…
Source: www.cyberdefensemagazine.com – Read more

400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild
Shadow Servers have identified 454 vulnerable SAP NetWeaver systems affected by a critical zero-day flaw, CVE-2025-31324, allowing unauthenticated file uploads and potential system compromise. Discovered