Technology ❯ Cybersecurity ❯ Research ❯ Threat Research Labs
A low-privilege ABAP code injection enables full takeover, making immediate patching critical.