Shifting your IT and sensitive data to the cloud? That transition demands a dedicated security strategy. As threats get smarter, your defenses need to be purpose-built. Check out this ASUG - Americas' SAP Users' Group podcast with Juan Perez-Etchegoyen and Guarav Singh as they lead with their SAP security expertise to guide you through how to approach #cybersecurity in the #cloud. If you've ever wondered: • Initial steps enterprises should take when securing their cloud migrations. • The importance of adopting a shared responsibility security model. • The cybersecurity benefits of RISE with SAP. Then look no further! 👀 https://bit.ly/44vZr8H #CloudMigration #EnterpriseSecurity #ThreatActors
Onapsis
Computer and Network Security
Boston, Massachusetts 19,249 followers
Protecting the business applications that power the global economy.
About us
Onapsis is the global leader in SAP cybersecurity and compliance, trusted by the world’s leading organizations to securely accelerate their SAP cloud digital transformations with confidence. As the SAP-endorsed and most widely used solution to protect SAP, the Onapsis Platform empowers Cybersecurity and SAP teams with automated compliance, vulnerability management, threat detection, and secure development for their RISE with SAP, S/4HANA Cloud and hybrid SAP applications. Powered by threat insights from the Onapsis Research Labs, the world’s leading SAP cybersecurity experts, Onapsis provides unparalleled protection, ease of use, and rapid time to value, empowering SAP customers to innovate faster and securely. Connect with Onapsis on LinkedIn or visit onapsis.com.
- Website
-
http://www.onapsis.com
External link for Onapsis
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Boston, Massachusetts
- Type
- Privately Held
- Founded
- 2009
- Specialties
- ERP security, SAP security, Oracle EBS security, cybersecurity, and business-critical application security
Locations
-
Primary
101 Federal St
Boston, Massachusetts 02110, US
-
Guevara 93
Chacarita, City of Buenos Aires 1427, AR
-
Speyerer Straße 6
Heidelberg, Baden-Württemberg 69115, DE
Employees at Onapsis
-
Greg Dracon
Partner at .406 Ventures
-
Richard Seewald
Founder and Managing Partner at Evolution Equity Partners
-
Alan Wu
-
Yuecel Karabulut, PhD
Blazing a trail in cybersecurity transformation to build a safer digital world | CISO Whisperer | Trust Executive | PhD in InfoSec | Duke MBA |…
Updates
-
The shift to SAP S/4HANA is no longer a matter of if, but when. ⏰ The clock is ticking for many SAP customers with two critical maintenance deadlines approaching: December 31, 2025, for SAP ECC 6.0 enhancement packages 1-5 (with no extended maintenance option), and December 31, 2027, for other core SAP Business Suite applications. Organizations face an unavoidable challenge to secure support and ensure business continuity. But how do you embark on such a transformative journey without being overwhelmed? Get all the guidance you need in our new blog: https://bit.ly/4eQDHrD #DigitalTransformation #S4HANA #RISEwithSAP #SAPSecurity
-
-
ICYMI: July's Patch Day was a record one with 30 new and updated SAP security patches.❗ Amongst them, our Onapsis Research Labs identified a Critical CVSS 10.0 Insecure Deserialization vulnerability in SAP SRM. This allows unauthenticated Remote Code Execution (RCE), making it a top priority to address. ORL also contributed to 14 other patches. Ensure your systems are secure. Get the details on July's crucial updates & how to act! ➡️ https://bit.ly/4lYbfq5 #SAPSecurity #PatchTuesday #HotNews #CVSS10 #OnapsisResearchLabs
-
-
Is your #SAP or #Oracle environment a blind spot? 🚨 Great chat with Evan Kirstel and Mariano Nunez on why traditional #cybersecurity fails against attacks on business-critical apps. Attackers are exploiting vulnerabilities without credentials, bypassing traditional controls. Threats like these in today's digital world require custom, tailored solutions. This is critical. Learn why generic tools fail and what you can do about it instead. ⬇️ https://bit.ly/4lUS40g #BusinessApplications #CloudSecurity #AI #ZeroDay #SapSecurity
Create📝Publish🗞️Amplify📣 TechInfluencer, Analyst, Content Creator w/600K Social Media followers, Deep Expertise in Enterprise 💻 Cloud ☁️5G 📡AI 🤖Telecom ☎️ CX 🔑 Cyber 🏥 DigitalHealth. TwitterX @evankirstel
Cybersecurity for business-critical applications represents one of the most significant blind spots in enterprise security today. As Mariano Nunez, CEO and co-founder of Onapsis reveals, sophisticated attackers are now targeting the crown jewels of organizations – their SAP, Oracle, and other mission-critical systems – with unprecedented success. What makes these attacks particularly alarming is how they bypass traditional security controls. While most organizations focus on user access controls and segregation of duties, today's threat actors exploit vulnerabilities at the application layer without requiring any user credentials. As Mariano explains, "Attackers are exploiting and attacking the systems even without a user to begin with. It's a different paradigm." This fundamental shift coincides with the migration of formerly protected internal systems to cloud environments where they're increasingly exposed to external interfaces, AI integrations, and new business models. The most sobering revelation comes from Mariano's disclosure of an unprecedented cyber campaign that began in January 2023. Chinese threat actors developed zero-day exploits for SAP systems, silently compromising hundreds of organizations worldwide, including critical infrastructure and government entities. Even after patches were released, many organizations found themselves in a troubling position: "It's almost as if you would unlock your front door and change the front door lock, but the thief is already in the basement." This represents the worst attack campaign against business applications in 15 years, highlighting the urgent need for specialized security approaches. Onapsis differentiates itself by providing purpose-built protection for these critical systems, working in close partnership with vendors like SAP and Oracle while helping security teams manage risk even when immediate patching isn't possible due to downtime constraints. For organizations navigating digital transformation, the message is clear: generic security tools provide a dangerous false sense of security when it comes to your most valuable business applications. Want to learn how your organization can protect its business-critical applications from sophisticated attacks? Listen to the full conversation and discover why traditional security approaches are failing to address these emerging threats.
Securing Business-Critical Apps in the Cloud Era
www.linkedin.com
-
Five years ago, our Onapsis Research Labs identified and disclosed the RECON vulnerability to SAP, leading to critical patches. Now, as we mark this anniversary, we've observed continued exploitation of this flaw in recent months. Our latest post looks back at RECON and highlights why, despite its age, it remains a threat if your SAP security hygiene is lacking or systems are exposed. This shows hackers are relentless in leveraging any vulnerability they can find. Read more about it here ➡️ https://bit.ly/43OwpAC #SAPSecurity #SAPVulnerabilities #RECONVulnerability
-
-
Let's hear it for the newest members of the Onapsis team! 👏 We love seeing new faces around here and are so happy to have you on the team. Welcome home! 🧡 #OnapsisLife #NewJoiners #Culture #Welcome
-
-
Ready for a virtual masterclass with the Enterprise Architect Community? Juan Perez-Etchegoyen and Guarav Singh will explore how to level up your SAP security strategy to be proactive and rooted in risk, readiness, and resilience. As the co-authors of Cybersecurity for SAP, JP and Guarav are joining Paul Kurchina to share their decades of experience in the SAP security space and provide the community with invaluable insights Come ready to learn and leave inspired with fresh perspectives to bring back to your team. 📅 July 29 🕦 11 a.m. ET Save your spot: https://bit.ly/4lxgr3R #EnterpriseArchitectCommunity #EnterpriseArchitects #SAPSecurity #CybersecurityForSAP #SAPPress
-
-
Yesterday's SAP Patch Day brought a record number of security patches, including a handful of critical vulnerabilities in the dangerous class of Deserialization of Untrusted Data. Earlier in 2025, we saw active exploitation of CVE-2025-31324 - the same vulnerability class. It's a crucial reminder to revisit your defenses. Watch our full breakdown to understand the risks: ▶️ https://bit.ly/3RJlbH4 Looking for a deeper understanding of these threats? Access more insights here: ⬇️ https://bit.ly/3S8VeRe If 2025 is teaching us anything, it's how absolutely critical effective SAP vulnerability management processes and technology are to stay ahead. Questions? Let's chat! #SAPSecurity #ZeroDay #CVE202531324 #CyberSecurity #ThreatIntel #Onapsis #JulyPatchDay #PatchTuesday #PatchDay #VulnerabilityManagement
-
-
As we shared earlier today, this #PatchTuesday is a unique one–SAP in collaboration with Onapsis has patched a high number of critical vulnerabilities, many similar to ones recently exploited as zero-day by threat actors. The following SAP Security Notes are especially critical to pay attention to as part of this month’s release: 3578900 (CVE-2025-30012) (CVSS 10) 3620498 (CVE-2025-42980) (CVSS 9.1) 3610892 (CVE-2025-42966) (CVSS 9.1) 3621771 (CVE-2025-42963) (CVSS 9.1) 3621236 (CVE-2025-42964) (CVSS 9.1) Why are these so critical for defenders? 🔹 Several of these vulnerabilities have critical severity ratings (CVSS 9 and CVSS 10), and are of the same type of CVE-2025-31324 and CVE-2025-42999 - two critical vulnerabilities that were widely exploited during March-June of this year. 🔹 Exploitation grants attackers full control over SAP’s critical business processes and information, which could result in espionage, sabotage and fraud, and bypasses traditional SAP security controls, such as Segregation of Duties and GRC solutions. 🔹 Attackers can also use these vulnerabilities to deploy ransomware on SAP, which will result in significant business disruption and losses for victim organizations. 🔹 Attacks can happen over the Internet for cloud/internet-facing SAP applications, but also against internal SAP systems. 🔹 Affected customers should apply SAP patches as soon as possible. 🔹 The Onapsis Research Labs team collaborated closely with SAP in the discovery and mitigation of these issues, and we would like to acknowledge SAP’s rapid response and diligence in releasing these security updates. Learn more and get the full breakdown below 🔽 #SAPPatchDay #SAPSecurity #PatchTuesday
-
-
-
-
-
+1
-
-
🗓️ It's #PatchTuesday, and Thomas Fritsch has you covered as always. This month is somewhat unique with 30 new and updated SAP security patches. Important note: several of these #SAPvulnerabilities have critical severity ratings and are of the same type as CVE-2025-31324 and CVE-2025-42999--two critical vulnerabilities that were widely exploited during March-June of this year by threat actors. Our team will be sending out additional details and context around these critical vulnerabilities--stay tuned. #SAPSecurityNotes #SAPSecurity