By exploiting these vulnerabilities, unauthenticated threat actors can gain unrestricted remote access to SAP business-critical data and The post Executive Threat Overview: Critical Zero-Day SAP Vulnerabilities Under Active Global Exploitation appeared first on Onapsis.