According to a recent study by SAP in association with Onapsis, the threat actors constantly target new vulnerabilities in and around SAP applications – days after the readiness of critical security patches.
The exploitation attempts were observed after certain security bugs were made public – scanning for at risk systems a few hours after these patches were released.
During the research, roughly 300 exploitations of SAP-specific vulnerabilities were observed. As explained in the study, “New unprotected SAP applications provisioned in the cloud (IaaS) environments were discovered and attacked in less than three hours, stressing the need to “shift left” and ensure new mission-critical applications are provisioned securely from day one.”
For more such updates follow us on Google News ITsecuritywire News.