15 Years•Zero Breaches•Real-Time Threat Response•AI-Powered Security•Built for Scale•15 Years•Zero Breaches•Real-Time Threat Response•AI-Powered Security•Built for Scale
15 Years•Zero Breaches•Real-Time Threat Response•AI-Powered Security•Built for Scale•15 Years•Zero Breaches•Real-Time Threat Response•AI-Powered Security•Built for Scale
Customer: Hospital (Saudi Arabia)
Industry: Healthcare
Users: 1,500+
Services: External Vulnerability Assessment & Penetration Testing, Risk Analysis, Remediation Guidance, Cybersecurity Modernization
A major hospital in the Kingdom of Saudi Arabia approached us to assess whether its external-facing systems could withstand real-world cyberattacks. With thousands of daily visitors and sensitive medical data flowing between systems, the hospital needed clear visibility into weaknesses that attackers could exploit.
Challenge / Pain Point
Although the hospital had a strong technical foundation, the assessment revealed several hidden risks:
- Apparent external resilience masking deeper application-level flaws
- A registration portal is vulnerable to stored cross-site scripting (XSS)
- A file upload feature on the careers page is lacking verification and security controls
- Weak internal segmentation allowed lateral movement once access was obtained
- Endpoint protection (Kaspersky EDR) is failing to detect malicious activity during testing
The hospital required a comprehensive evaluation to uncover exposure points and validate the effectiveness of its defenses.
Our Approach
We executed a full-scope external VAPT engagement, simulating attacker techniques used against healthcare institutions worldwide.
1. Application Security Testing
- Discovered a stored XSS vulnerability in the user registration page
- Demonstrated how malicious scripts could trigger automatically for privileged users
- Showed how this could be used for unauthorized queries, session manipulation, or access escalation
2. Secure Upload Testing
- Identified insecure file upload controls within the careers portal
- Uploaded controlled test webshells to prove remote server access was possible
- Demonstrated risks including website defacement, file modification, and backend interaction
3. Lateral Movement & Infrastructure Mapping
- Mapped the internal network from the compromised web server
- Exploited weak segmentation and insufficient endpoint monitoring
- Successfully escalated privileges and gained full access to the domain controllers
- Extracted user credentials to highlight the severity of potential real-world impact
4. Remediation Guidance & Transformation
- Delivered a clear remediation roadmap prioritizing high-risk findings
- Supported the hospital in strengthening system hardening and segmentation
- Recommended modern endpoint protection aligned with current threat techniques
- Guided the deployment of a new EDR solution (CrowdStrike Falcon) across 6,000+ endpoints
Results & Impact
- Complete visibility into actual attack paths that could compromise patient data and operations
- Improved endpoint protection through full CrowdStrike Falcon deployment
- Stronger infrastructure segmentation prevents unauthorized lateral movement
- Modernized defensive posture with enhanced monitoring, detection, and governance
- HIPAA compliance achieved within 6–12 months, significantly raising security maturity
- Long-term partnership established, ensuring ongoing resilience and continuous improvement
Ready to Redefine Your Security?
Let our AI+Cyber experts assess your threat landscape.
- No commitment required
- Enterprise-grade analysis
- Immediate actionable insights