The Latest:

Uncovering Cybersecurity Vulnerabilities in 2024


In today's interconnected digital landscape, trust in cloud services has skyrocketed in recent years, with companies shifting a significant portion of their workloads to the cloud and organizations increasingly relying on cloud computing to streamline operations, enhance scalability, and boost productivity. Recent reports indicate that enterprises host currently more than 50% of their workloads in the cloud, highlighting the growing reliance on cloud infrastructure for business operations. However, this migration to the cloud brings its own ...

Feb 16 | Paulina Jaramillo

The Surge in Third-Party SAP Service Providers


SAP support plays a crucial role in maintaining smooth operations within organizations that use SAP. It ensures uninterrupted access to critical ...

Nov 9 | Paulina Jaramillo

How to Secure Your Cloud Environment?


Security in any cloud environment is a shared responsibility between the organization and the cloud provider. The distribution of responsibilities ...

Apr 27 | Danica Esteban

CVE-2020-6287 AKA RECON (Remotely Exploitable Code on NetWeaver)


Identified as HotNews SAP Note #2934135 (CVE-2020-6287) in the July 2020 SAP Security Notes mentioned in our earlier blog SAP Security Patch Day, the ...

Sep 7 | Vladimir Mokrushov

SAP Security Patch Day


According to a study by Cybersecurity Ventures, cyber-crimes will cost the world almost $6 trillion a year by 2021. In the last few years, ...

Sep 1 | Vladimir Mokrushov