Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

In case you missed it, in the first part of this series we talked about the importance of hardening security for the application layer as part of your proactive approach to mitigating ransomware.
We know exploited vulnerabilities are the most common root cause of ransomware attacks and we also know that threat actors are actively targeting SAP applications as an entry point to enterprise systems.
Avoiding these application vulnerabilities before they can be exploited is an essential part of a proactive ransomware strategy, as recommended by NIST and SAP. However, understanding your SAP attack surface and addressing these vulnerabilities is easier said than done.
You need a way to validate that the applications across your landscape are following these best practices.
Each vulnerability has its own independent and interconnected risk to the business.
There could be overlap between these two groups, and the impact of a successful exploit could be magnified in severity depending on how chainable or how connected the application is in the broader SAP landscape.
With the right partner, you can be proactive with your ransomware strategy and more effectively avoid vulnerabilities that could be exploited by threat actors.
Onapsis Assess addresses the common challenges that keep organizations from building successful vulnerability management programs around SAP. More than just an SAP plugin, Assess is part of the Onapsis Platform, the only cybersecurity and compliance solution in the SAP Endorsed Apps program.
We are regularly expanding our scope to cover more types of assets, most recently adding comprehensive security checks for SAProuter, a potential point of ingress for attackers.
Leverage the most robust and up-to-date vulnerability checks available: Onapsis Research Labs is the most prolific and celebrated contributor of vulnerability research to the SAP Product Security Response Team.
Our vulnerability scans are regularly updated with the Labs' latest security research, so you don't have to keep up with the latest security best practices or threat intel yourself.
Identify security vulnerabilities and threats beyond a simple list of missing patches, such as misconfigurations, misauthorizations, and problems in previously deployed custom code.
Gain prioritization capabilities from risk-driven analysis and real-time threat intel: Our context-rich scan results translate vulnerabilities into business risk, so you easily understand what to fix first.
Real-time Onapsis threat intelligence and AI elevate the vulnerabilities that warrant immediate attention due to elevated threat activity or vulnerability chaining observed in the wild.
Accelerate your SAP security journey: Powered by AI and over 14 years of SAP and cyber experience, the Onapsis Security Advisor provides a single, high-impact view of your current security standing and tailored, actionable guidance for how to improve.
I hope at this point it's clear that minimizing your SAP attack surface is not only an essential part of your proactive approach to ransomware, but also an achievable goal if you have the right partner.
Avoiding vulnerabilities completely is unrealistic and remediating vulnerabilities takes time - on average, 65 days for critical severity vulnerabilities.
I think of this as a one-two punch for addressing vulnerabilities - while you're running your point-in-time scans and working through remediation to reduce your attack surface, you're also continuously monitoring in between those points-in-time for any suspicious behavior or potential exploit activity that might be targeting the vulnerabilities you haven't been able to address yet.
Detecting that anomalous or suspicious behavior as quickly as possible is critical to efficiently and effectively protecting your SAP environment.
We'll explore the challenges with continuously monitoring SAP applications and what's needed to overcome them.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 13 Dec 2023 18:43:12 +0000


Cyber News related to Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications

Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications - In case you missed it, in the first part of this series we talked about the importance of hardening security for the application layer as part of your proactive approach to mitigating ransomware. We know exploited vulnerabilities are the most common ...
11 months ago Securityboulevard.com
The Biggest SAP Cybersecurity Mistake Businesses Make-And How To Prevent It - There are no small mistakes-every mistake in cybersecurity is potentially catastrophic. Several oversights that have quietly grown into some of the most significant cybersecurity missteps can be found within SAP software configurations and include ...
11 months ago Cybersecurity-insiders.com
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
1 year ago Heimdalsecurity.com
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
10 months ago Unit42.paloaltonetworks.com
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
10 months ago Securityboulevard.com
Ransomware in 2023 recap: 5 key takeaways - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. While some ransomware trends hardly changed over the last year, such as LockBit's continued dominance, ransomware criminals also challenged ...
9 months ago Malwarebytes.com
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
10 months ago Feeds.fortinet.com
Declining Ransomware Payments: Shift in Hacker Tactics? - Several cybersecurity advisories and agencies recommend not caving into ransomware gangs' demands and paying their ransoms. It seems the tide is turning, with a decline in ransomware payments; this article explores the trend and what it might mean ...
9 months ago Securityboulevard.com
Proactive FBI Hack Disrupts Hive Ransomware Network - In an unprecedented proactive hacker attack, the FBI has laid siege to the huge Hive ransomware network, successfully disrupting it and taking control of its payment mechanisms. Following extensive investigations, the Bureau infiltrated the ...
1 year ago Bleepingcomputer.com
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
11 months ago Helpnetsecurity.com
Best Ransomware Protection Practices for Midsize Organizations - Ransomware Protection has emerged as a crucial step in cybersecurity since ransomware attacks have become a major threat to businesses of all sizes, including midsize organizations. Ransomware attacks can be delivered via email attachments or links, ...
10 months ago Securityboulevard.com
The Week in Ransomware - Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored to be caused by a law enforcement action. The FBI revealed this week that they hacked the BlackCat/ALPHV ...
10 months ago Bleepingcomputer.com
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
8 months ago Feeds.fortinet.com
The Biggest Tech Talent Gap Can Be Found in the SAP Ecosystem - They're not just looking for people who can write code; they want individuals who can implement, integrate, and run a variety of software platforms crucial for modern businesses. A recent Forbes case study explored dynamic areas like cybersecurity, ...
10 months ago Cysecurity.news
The Week in Ransomware - Governments struck back this week against members of ransomware operations, imposing sanctions on one threat actor and sentencing another to prison. On Tuesday, the Australian, US, and UK governments announced sanctions against Aleksandr Gennadievich ...
9 months ago Bleepingcomputer.com
Waiting for the BlackCat rebrand - We saw another ransomware operation shut down this week after first getting breached by law enforcement and then targeting critical infrastructure, putting them further in the spotlight of the US government. While the Tor onion domain seizure was a ...
8 months ago Bleepingcomputer.com
SAP's First Patches of 2024 Resolve Critical Vulnerabilities - Enterprise software maker SAP this week announced the release of 10 new and two updated security notes as part of its first Security Patch Day of 2024. Rated 'hot news', the highest rating in SAP's notebook, two of the new and one of the updated ...
10 months ago Securityweek.com
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
9 months ago Feeds.fortinet.com
How ransomware gangs are engaging - As ransomware gangs continue to market themselves as legitimate businesses complete with customer service representatives, new research from Sophos showed that threat actors are expanding public relations efforts to further pressure victims into ...
11 months ago Techtarget.com
Ransomware review: January 2024 - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. In February, there were 376 ransomware victims, marking an unusually active month for the historically subdued time period. February didn't ...
8 months ago Malwarebytes.com
VX-Underground malware collective framed by Phobos ransomware - A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks using the encryptor. Phobos launched in 2018 in what is believed to be a ransomware-as-a-service derived from the ...
11 months ago Bleepingcomputer.com
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
1 month ago Securelist.com
The Week in Ransomware - An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. The threat actors are said to be affiliates of numerous ransomware ...
11 months ago Bleepingcomputer.com
Ransomware's Impact May Include Heart Attacks, Strokes & PTSD - First-order harms: Direct targets of ransomware attacks. The increasing convergence of IT and OT leave physical infrastructures more vulnerable to ransomware, even though most ransomware operators lack the capability to directly compromise OT or ...
9 months ago Techrepublic.com
The Week in Ransomware - This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums data theft forum. That does not mean there was nothing of interest released this week about ransomware. A report by CISA said that the ...
6 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)