Researchers claim that most cyberattackers targeting SAP applications use one of three major cyberattack vectors.from Latest topics for ZDNet in Security http://ift.tt/1GOyasV