Skip to content

Key Insights Blog

Read the latest insights from our experts on Cybersecurity and Risk management for SAP. 
Critical SAP S4HANA code injection vulnerability (CVE-2025-42957)
SAP Vulnerability

Critical SAP S/4HANA code injection vulnerability (CVE-2025-42957) exploited in the wild – patch immediately

The exploit was discovered by the SecurityBridge Threat Research Labs, which has also verified that the exploit is being used in the wild. Immediate patching is imperative.

CVE-2025-42957 is a critical ABAP code injection flaw in SAP S/4HANA (CVSS 9.9) that allows a low-privileged user to take complete control of your SAP system.

Read More »
SecurityBridge at VNSG Themadag Security 2025 – SAP professionals networking and exploring cybersecurity, cloud security, GRC, and identity management solutions in Bunnik, The Netherlands.
Events

VNSG Themadag Security 2025

Join SecurityBridge at VNSG Themadag Security – “For Your Eyes Only” – on October 7, 2025, in Bunnik. Discover the latest in SAP security, from threat detection and vulnerability management to compliance and identity & access control. Connect with experts, learn from real-world case studies, and explore how to secure your SAP landscape without compromising innovation.

Read More »
SIEM SAP - integration
SAP Cybersecurity

Elevating SAP Cybersecurity: The Strategic Imperative of an SAP SIEM Integration

In today’s digital landscape, SAP solutions are central to business operations but also prime targets for cyberattacks. While SAP offers internal security features, integrating Security Information and Event Management (SIEM) systems with SAP is essential for comprehensive cybersecurity.

SIEM systems collect, normalize, and analyze security-relevant logs from across IT infrastructures. This integration bridges the gap between SAP-specific monitoring and enterprise-wide security, enabling rapid detection and response to threats. For many organizations, the first challenge in integrating SAP logs with SIEMs is managing the complexity and high volume of logs.

Read More »