Attackers Can Use SAP to Bridge Corporate, Operational ICS Networks
in ThreatPost by Michael Mimoso