JP Perez-Etchegoyen (@jp_pereze) 's Twitter Profile
JP Perez-Etchegoyen

@jp_pereze

SAP and Oracle Security Researcher, Information Security Enthusiast. CTO @onapsis

ID: 819695862

linkhttp://www.onapsis.com calendar_today12-09-2012 14:43:11

738 Tweet

601 Takipçi

191 Takip Edilen

The Security Transformation Research Foundation (@transform_sec) 's Twitter Profile Photo

3 ways the public sector can improve #security in order to enhance service delivery buff.ly/3znM6Pc TechNative Onapsis JP Perez-Etchegoyen #cybersecurity #government #govtech #tech #publicsector #localgovernment #digital #innovation #leadership #CISO #CIO #CTO #CDO

3 ways the public sector can improve #security in order to enhance service delivery

buff.ly/3znM6Pc

<a href="/TechNative/">TechNative</a> <a href="/Onapsis/">Onapsis</a> <a href="/jp_pereze/">JP Perez-Etchegoyen</a> #cybersecurity #government #govtech #tech #publicsector #localgovernment #digital #innovation #leadership #CISO #CIO #CTO #CDO
Pablo Artuso 🗿🇦🇷 (@lmkalg) 's Twitter Profile Photo

Since 12/22, SAP is patching critical vulnerabilities as a result of a research project that I've been doing for some time. Today, my key finding was patched: CVE-2023-28761. An innocent 6.5 bug, that opens the door to abusing all those critical patched bugs through the Internet.

Pablo Artuso 🗿🇦🇷 (@lmkalg) 's Twitter Profile Photo

Our talk was accepted for Black Hat. I'm super happy but still shocked about this news. I wrote some paragraphs about this achievement linkedin.com/posts/pablo-ag… Hope you enjoy our new talk with Yvan 'iggy' G.

Onapsis (@onapsis) 's Twitter Profile Photo

The latest threat intelligence from Onapsis Research Labs in collaboration with Flashpoint dives into threat actor groups, their TTPs, and need-to-know trends for defenders. 🌐 Download the report & hear from our experts LIVE on April 24: bit.ly/3W1rVTI

JP Perez-Etchegoyen (@jp_pereze) 's Twitter Profile Photo

Research highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations. csoonline.com/article/209233…

Onapsis (@onapsis) 's Twitter Profile Photo

This Wednesday: Join JP Perez-Etchegoyen and Christian Rencken of Flashpoint to discover the latest in threat actor convos and methods around exploiting SAP applications. RSVP now to save your spot: bit.ly/3Jrj1re #Onapsis #CH4TTER #ThreatResearch #SAPsecurity #Ransomware

This Wednesday: Join <a href="/jp_pereze/">JP Perez-Etchegoyen</a> and Christian Rencken of <a href="/FlashpointIntel/">Flashpoint</a> to discover the latest in threat actor convos and methods around exploiting SAP applications.

RSVP now to save your spot: bit.ly/3Jrj1re

#Onapsis #CH4TTER #ThreatResearch #SAPsecurity #Ransomware
JP Perez-Etchegoyen (@jp_pereze) 's Twitter Profile Photo

I had the opportunity to join Bloomberg Intelligence's Mandeep Singh to discuss the deployment of security for ERP applications such as SAP. Including platformization, integration of Onapsis with other providers and into the customers’ environment. bloomberg.com/news/audio/202…

Onapsis (@onapsis) 's Twitter Profile Photo

Your SAP system is the powerhouse of your enterprise, much like a mighty fortress in space. But even the strongest defenses can have flaws. Join us for a session that identifying & mitigating these critical weaknesses to protect against #cyber threats: bit.ly/4b3g0c9

Neil C. Hughes (@neilchughes) 's Twitter Profile Photo

Tech Talks Daily: JP Perez-Etchegoyen CTO Onapsis discusses the importance of developing a nuanced strategy that harnesses the potential of generative AI while maintaining a strong focus on cybersecurity. techblogwriter.co.uk/onapsis-jp-etc…

UBAonline (@ubaonline) 's Twitter Profile Photo

Exigimos una recomposición salarial justa para nuestros/as profesores/as y para todo el personal nodocente. Salarios dignos para quienes tienen la misión de garantizar una formación de excelencia para nuestros/as estudiantes. #CuidemosLoQueFunciona #CuidemosLaUba

Onapsis (@onapsis) 's Twitter Profile Photo

Onapsis Research Labs released a tool allowing ALL SAP customers to analyze their environment to identify if any of their systems are vulnerable to #CVE-2025-31324 & check for known webshells currently used in the active exploitation campaign: bit.ly/3S8VeRe

Onapsis Research Labs released a tool allowing ALL SAP customers to analyze their environment to identify if any of their systems are vulnerable to #CVE-2025-31324 &amp; check for known webshells currently used in the active exploitation campaign: bit.ly/3S8VeRe
Onapsis (@onapsis) 's Twitter Profile Photo

SAP Zero-Day (CVE-2025-31324) Active exploitation is underway. Join our live briefing 4/29 to learn how to assess risk & secure your systems. Free assessments: [email protected]. 📅 Register: bit.ly/44HhGs5 #SAPSecurity #ZeroDay

SAP Zero-Day (CVE-2025-31324)

Active exploitation is underway.

Join our live briefing 4/29 to learn how to assess risk &amp; secure your systems.
Free assessments: connect@onapsis.com.

📅 Register: bit.ly/44HhGs5

#SAPSecurity #ZeroDay
CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ We added SAP NetWeaver unrestricted file upload vulnerability, CVE-2025-31324 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

🛡️ We added SAP NetWeaver unrestricted file upload vulnerability, CVE-2025-31324 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q &amp; apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
Onapsis (@onapsis) 's Twitter Profile Photo

🔐 SAP comes with unique security challenges—are you ready? 📚 Join us May 13 @ 10 AM ET for a live Book Club with the authors of Cybersecurity for SAP. Ask questions, get insights. 🎟️ Register: hubs.la/Q03f6wWQ0 #SAPSecurity #Cybersecurity #SAPPRESSBookClub

🔐 SAP comes with unique security challenges—are you ready?

📚 Join us May 13 @ 10 AM ET for a live Book Club with the authors of Cybersecurity for SAP. Ask questions, get insights.

🎟️ Register: hubs.la/Q03f6wWQ0
#SAPSecurity #Cybersecurity #SAPPRESSBookClub
Onapsis (@onapsis) 's Twitter Profile Photo

🆕 SAP Zero-Day IoC Scanner available from Mandiant + Onapsis 🔎 This tool aims to help organizations identify IoCs associated with exploitation of a recently patched vulnerability in SAP NetWeaver Application Server Java: CVE-2025-31324. Learn more: bit.ly/42Fk1m9

🆕 SAP Zero-Day IoC Scanner available from Mandiant + Onapsis 🔎 

This tool aims to help organizations identify IoCs associated with exploitation of a recently patched vulnerability in SAP NetWeaver Application Server Java: CVE-2025-31324. Learn more: bit.ly/42Fk1m9
CrowdSec (@crowd_security) 's Twitter Profile Photo

🔎 In May’s VulnTracking report, we take a deep dive into SAP NetWeaver (CVE-2025-31324). What we discovered: When public exploits were released, bad actors (such as botnets) and legitimate security scanners surged simultaneously, proving both sides depend on the same

🔎 In May’s VulnTracking report, we take a deep dive into SAP NetWeaver (CVE-2025-31324).

What we discovered: When public exploits were released, bad actors (such as botnets) and legitimate security scanners surged simultaneously, proving both sides depend on the same