
Precision Transcription, LLC
Medical Transcription Transcription Editing Voice recognition



Medical Transcription Transcription Editing Voice recognition

We are Erasmus MC. Our roots lie in Rotterdam, a city and port of international standing. We are the most innovative university medical center in the Netherlands and one of the world’s leading centers of scientific research. We are committed to achieving a healthy population and pursuing excellence in healthcare through research and teaching. Day in, day out, our staff, volunteers and students work with passion and dedication to achieve everything we stand for: safe, first-rate healthcare for patients with complex issues, unusual and rare conditions or acute needs. But we also stand for top-quality teaching that attracts ambitious, inquisitive and talented students and seeks to answer the healthcare questions of tomorrow. And we stand for world-class scientific research that bolsters our understanding of diseases and disorders and helps to predict, treat and prevent them. We do our work based on our basic principles, the core values of Erasmus MC, 'responsible', 'connecting' and 'enterprising'. We believe that we provide the best care, research and education if we are responsible, binding and enterprising.
Security & Compliance Standards Overview












No incidents recorded for Precision Transcription, LLC in 2026.
No incidents recorded for Erasmus MC in 2026.
Precision Transcription, LLC cyber incidents detection timeline including parent company and subsidiaries
Erasmus MC cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.