In this #Team82 blog, read how @Claroty researchers bypassed Web Application Firewalls by abusing JSON-based SQL. 5 vendors have since fixed the issue. #industrialcyber #cybersecurity https://t.co/lHIuCjSWzh https://t.co/EUzoZSoUyO