News

BianLian, RansomEXX, and others, are jumping the NetWeaver bandwagon In late April, SAP fixed a 10/10 bug in NetWeaver Visual ...
SAP fixed CVE-2025-42999, a 9.1/10 vulnerability in NetWeaver This one was chained with CVE-2025-31324, which was fixed in ...
The critical vulnerability is being exploited by BianLian, RansomwEXX and a Chinese nation-state actor known as Chaya_004 ...
BianLian and RansomExx Exploit SAP CVE-2025-31324 for Full Access, Deploy PipeMagic and Brute Ratel in Multi-Nation Attacks.
SAP released 16 new security notes on its May 2025 Security Patch Day, including for another critical NetWeaver vulnerability ...
At the end of April, SAP had to close a critical security gap in Netweaver. Ransomware groups are now also attacking the leak ...
Threat actors are revisiting SAP NetWeaver instances to leverage webshells deployed via a recent zero-day vulnerability.
Ransomware gangs RansomEXX and BianLian joined ongoing attacks on SAP NetWeaver servers, targeting a critical vulnerability tracked CVE-2025-31324 that enables unauthenticated remote code execution.
SAP NetWeaver instances hacked via CVE-2025-31324 + Confirmed China-nexus APT involvement + Critical infrastructure at risk.
The US IT security authority CISA warns of attacks on a new SAP Netweaver vulnerability as well as on Chrome and Draytek ...
Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.
Multiple ransomware operators are trying to take advantage of the recently discovered, maximum severity flaw, affecting SAP NetWeaver Visual Composer. This is according to, among others ...