Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mini Shai-Hulud Targets SAP npm Packages With a Bun-Based Secret Stealer

A new npm supply-chain compromise is targeting the SAP developer ecosystem. The affected packages we are tracking so far are: The pattern is familiar but also a bit different: a trusted package receives a new preinstall hook, the hook runs a new setup.mjs file, and that loader downloads the Bun JavaScript runtime to execute a large obfuscated payload named execution.js. The payload is an 11.7 MB credential stealer and propagation framework.

What makes One Identity an Overall Leader in SAP access control

SAP environments, especially in the age of cloud work and hybrid infrastructures, are ripe with security complications. But SAP support and security is nothing to scoff at. Access controls alone in SAP environments require compliance capabilities for ultimate security, regardless of the security solution or deployment scenario.

Why DLP alone can't protect Manufacturing IP (and what can)

DLP and Secude solutions work together to protect your IP data from creation to deletion - no matter where it travels. Here’s how. Engineering simulations. Machinery instructions. Prototype designs. CAD software is essential across the modern manufacturing production chain and contains manufacturers’ most confidential intellectual property (IP). Yet, much of the manufacturing industry still relies on Data Loss Prevention (DLP) tools to protect its CAD data.

DLP leaves IP protection gaps. Here's how AECO can close them.

DLP and Secude solutions protect your IP data from generation to storage to deletion - no matter where it travels. Here’s how. Building designs, mechanical drawings, structural plans. CAD software is the backbone of modern AECO projects and contains some of AECO’s most confidential intellectual property (IP). But most architects, engineers, construction firms and operations companies still rely on Data Loss Prevention (DLP) tools to protect their CAD data.

Defense: DLP alone can't protect your IP. Here's what can.

DLP and Secude solutions work alongside each other to protect your IP data from generation to storage and in transit. Here’s how. Submarine motors. Aircraft engines. Spatial systems. Command platforms. No matter the product, CAD software underpins the modern Defense production chain and contains Defense contractors’ most confidential intellectual property (IP).

The 4 CAD file security measures AECO needs for IP protection

To protect your IP, your CAD files need file-level security, unencrypted labelling, digital supply chain security and CAD file data governance. How seriously do you take IP protection? Architecture, Engineering, Construction and Operations (AECO) companies that treat IP protection as an afterthought are sleepwalking into disaster.

Fake SAP Concur Extensions Deliver New FireClient Malware Variant

The BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) team are tracking an adversary luring users into downloading fake Concur browser extensions. The fake browser extension installer contains a FireClient Loader designed to gather host information and send to its command and control (C2) server. If execution succeeds with successful communication to the C2, the loader drops a backdoor BlueVoyant is naming FireClient Backdoor.

SOAR in the AI era: How SAP uses intelligent workflows to build an AI SOC

SOAR was created to help security teams work faster and more consistently by automating and orchestrating core security operations. It has always had to adapt to new and evolving technologies, but our current AI era has brought about a turning point. As cloud environments scale, manual playbooks can’t keep up. Now, it’s not enough to automate. We need systems that can understand the context they’re running in and adapt accordingly.

CVE-2025-42890: Hard-Coded Credentials in SAP SQL Anywhere Monitor (Non-GUI)

On November 11, 2025, SAP published a security advisory as part of their November security patches, addressing a maximum severity vulnerability identified as CVE-2025-42890 in SQL Anywhere Monitor (Non-GUI) version 17.0. The vulnerability involves hard-coded credentials, which exposes system resources to unauthorized users and allows threat actors to execute arbitrary code without authentication.