{"id":1434,"date":"2024-07-18T11:14:37","date_gmt":"2024-07-18T11:14:37","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/18\/sap-ai-core-vulnerabilities-expose-customer-data-to-cyber-attacks\/"},"modified":"2024-07-18T11:14:37","modified_gmt":"2024-07-18T11:14:37","slug":"sap-ai-core-vulnerabilities-expose-customer-data-to-cyber-attacks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/18\/sap-ai-core-vulnerabilities-expose-customer-data-to-cyber-attacks\/","title":{"rendered":"SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks"},"content":{"rendered":"<p>\u200bCybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and deploying predictive artificial intelligence (AI) workflows that could be exploited to get hold of access tokens and customer data.<br \/>\nThe five vulnerabilities have been collectively dubbed SAPwned by cloud security firm Wiz.<br \/>\n&#8220;The vulnerabilities we found could have allowed attackers\u00a0Cybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and deploying predictive artificial intelligence (AI) workflows that could be exploited to get hold of access tokens and customer data.<br \/>\nThe five vulnerabilities have been collectively dubbed SAPwned by cloud security firm Wiz.<br \/>\n&#8220;The vulnerabilities we found could have allowed attackers\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and deploying predictive artificial intelligence (AI) workflows that could be exploited to get hold of access tokens and customer data. The five vulnerabilities have been collectively dubbed SAPwned by cloud security firm Wiz. &#8220;The vulnerabilities we found could have allowed attackers\u00a0Cybersecurity&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/18\/sap-ai-core-vulnerabilities-expose-customer-data-to-cyber-attacks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":1435,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1434"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=1434"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1434\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/1435"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=1434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=1434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=1434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}