Product
Company
Blog
Careers
Contact Us
Contact Us
Blogs
Breaching the Perimeter: Using AI to Compromise 23 Healthcare Organizations
Specular identified a SQL injection vulnerability in software commonly used by hospitals that allows an attacker to compromise sensitive data. This blog outlines how we identified the vulnerability using AI, software vendor and supply train trust, and coming data sources to identify hidden web application.
Sign up for updates
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We will never share your email address with third parties.