The Attacker’s Path to Hacking UiPath RPAs
Leaving the attack surface created by UiPath robotic process automations unattended is more dangerous than you might think.
In this webinar, security expert Amichai Shulman demonstrates key RPA weaknesses, such as SQL injection, command injection, supply chain vulnerabilities, and container security flaws.
The Attacker’s Path to Hacking UiPath RPAs Read More »