Leaving the attack surface created by UiPath robotic process automations unattended is more dangerous than you might think.In this webinar, security expert Amichai Shulman demonstrates key RPA weaknesses, such as SQL injection, command injection, supply chain vulnerabilities, and container security flaws.The post The Attacker's Path to Hacking UiPath RPAs appeared first on Nokod Security.
Nokod Security is an Israel-based cybersecurity platform that offers solutions such as application security, and vulnerability detection for enterprises.