Connect with us

Tech

Research Grid raises $6.48M to automate clinical trial admin

Amber Hill spent 14 years as a medical researcher. She didn’t mind the work, but there was one thing she consistently hated: administrative tasks. 

“I think most people do, especially in research,” she told TechCrunch. She would rather be analyzing data or building relationships with patients, she said. “But I was spending so much time doing manual tasks that didn’t require any medical expertise. It’s a process that’s completely broken, and I knew it could be fixed.” 

So, she did what any problem solver would do: She launched a company. 

Her startup, called Research Grid, was founded in London in 2020. The company is trying to make clinical trials more efficient by automating administrative and data management workflow. It hails itself as the the only software that can automate full back-office trials.

Research Grid on Tuesday announced a $6.48 million seed round, led by Fuel Ventures, with participation from firms including Ada Ventures and Morgan Stanley Inclusive Ventures Lab. 

Research Grid consists of two patent products: Inclusive and Trial Engine. Together, the products handle tasks such as flagging protocol errors, data extraction, and workflow. Right now, clinical trials use a more manual process supported by legacy software systems that often cause expensive delays during a trial. 

“They are built on old codebases, which means it’s almost impossible for them to innovate,” she said. “Our tech is already superior, and while the displacement of large players won’t happen overnight, it’s going to happen, and I don’t see why it won’t be us that does it.” 

But there are other issues Research Grid hopes to tackle, such as making clinical recruitment faster and better handling of the pressure that often comes from the Federal Drug Administration (FDA) regarding compliance. Recruitment can take months, “it’s manual, administrative, and hard to find people,” she said. It’s also hard to do consistently when it comes to finding people who fit in a narrow, strict criteria for a research trial.

Right now, it’s a very manual process, using non-targeted social ads and parsing health records. “If there’s not enough participation, researchers can’t understand if a drug or intervention is safe and effective, which ultimately means it’s not approved by regulators to go to the people who might need it most.” 

Plus, the FDA has now made it a requirement to make clinical trials more diverse, since women and people of color are often left out of medical trials. Hill sought to build a customer relationship management feature in Research Grid that has more than 80,000 groups, across 157 countries, representing around 2,000 medical conditions, she said. “It uses AI to extend far beyond traditional methods of finding people,” she said. “It helps out partners to find who they need to find in seconds rather than months.” 

Hill was introduced to her lead investor by the EMEA team of the venture firm Plug and Play, who came into this round early. The company, which has raised $8 million in venture funding to date, will use this latest funding to invest in more research and development, build out its engineering team, and further expand into the U.S. and Asian markets. 

“The next challenge is mostly about setting up the corporate infrastructure to seamlessly serve these partners,” she said of operating in the U.S., U.K., and Asia. 

Though this company, like many great ones, was built out of a frustration point, Hill said she always had a passion for entrepreneurship. She ran a nonprofit while studying for her doctorate as a way to widen her access to research. Running the business taught her how to be resilient and resourceful, and how to work with different types of people. “I kept a volunteer team together over three years without financial resources,” she recalled. “We fundraised the ‘old school’ hard way in buckets and took it to the bank.” 

Her first tech idea was to use AI to automate all the work that goes into running a nonprofit. “We’ve come full circle because that idea morphed into our pre-trial product and meaningful IP,” she said. When she knew she wanted to launch Research Grid, she applied to an incubator program to help switch her “mindset from nonprofit to for-profit,” from “academic to an entrepreneur.” Then she went through an accelerator program that put her in front of some of the largest investors in London; she raised her first £1 million — a feat in a country where Black founders raise less than 2% of all venture capital. And from 2019 to 2023, only eight Black women raised more than $1 million in venture funding, as TechCrunch previously reported.

The hardest part for Hill was getting the company off the ground during the pandemic as a solo founder. She managed through and is now in growth mode. Revenue grew over 20x last year and is expected to continue to grow, she said. The company is working across Big Pharma, Contract Research Organisations, and Clinical Sites, hiring more experts, and improving their AI technology.

“AI is expediting precision medicine, drug development operations, and changing the care pathway for everyone,” she said. “It’s here to stay.” 

This story was updated to reflect the exact number Research Grid raised.

source

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

The fax machine is the bottleneck in US healthcare, and VCs are starting to notice

Like many AI companies automating work that humans currently do, Basata will eventually face a harder question about where the line is between augmenting workers and displacing them. For now, the founders say the administrative staff they work with aren’t worried about that; they’re more worried about drowning.
source

Continue Reading

Tech

US defense contractor who sold hacking tools to Russian broker ordered to pay $10M to former employers

Peter Williams, a veteran cybersecurity executive who was the head of the hacking and surveillance tech division of U.S. defense contractor L3Harris, has been ordered to pay $10 million to his former employer. Williams was the central figure in one of the worst leaks of advanced hacking tools in the history of the United States and its closest allies.

On Wednesday, a judge ordered Williams to pay that amount in restitution on top of the $1.3 million he had already been ordered to pay to L3Harris. Williams, a 39-year-old Australian citizen who previously worked in one of Australia’s intelligence agencies, was until last year the general manager of Trenchant. Born out of the acquisition of two sister startups, Trenchant is L3Harris’ division that develops advanced spyware and hacking tools and sells them to the U.S. government and its allies in the Five Eyes intelligence alliance, a coalition of five English-speaking nations that share classified intelligence with one another. In addition to the U.S., the alliance includes Australia, Canada, New Zealand, and the United Kingdom.

Veteran cybersecurity reporter Kim Zetter first reported the new order to pay restitution in her newsletter. 

Williams’ lawyers did not respond to a request for comment.

Last year, Williams was arrested and accused of stealing seven unspecified trade secrets — almost certainly cyber exploits, which is code that hijacks software vulnerabilities, and surveillance technology — from Trenchant and then selling them to Operation Zero. The Russian firm acts as a broker, buying and selling hacking tools, and it says it works exclusively with the Russian government and local companies.

Williams pleaded guilty and was sentenced to more than seven years in prison. 

Williams made $1.3 million selling the trade secrets, which he used to buy luxury watches, a house near Washington, D.C., and family vacations. Trenchant told prosecutors that it suffered losses of up to $35 million due to Williams’ theft. 

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

U.S. prosecutors said Williams “betrayed” the United States and its allies by giving Operation Zero, which the U.S. government calls “one of the world’s most nefarious exploit brokers,” tools that could have been used to hack “millions of computers and devices around the world.” 

As TechCrunch previously reported, Williams took advantage of his privileged “full access” to Trenchant’s internal network to siphon the tools out of the company’s offices. After Williams sold the hacking tools to Operation Zero, some of them ended up being used by Russian government spies in Ukraine, and later Chinese cybercriminals, according to former L3Harris employees who recognized the stolen code in cybersecurity research that Google published after investigating the cyberattacks in which those tools were deployed.

Williams also tried to frame one of his employees for the theft.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

source

Continue Reading

Tech

Poland says hackers breached water treatment plants, and the US is facing the same threat

Poland’s intelligence service said it detected attacks on five water treatment plants where hackers could have taken control of the industrial equipment inside, including, in the worst case, tampering with the safety of the water supply.

The story is relevant beyond Poland’s borders: U.S. water infrastructure has faced similar threats in recent years. In 2021, a hacker briefly gained access to a water treatment plant in Oldsmar, Florida and attempted to increase the level of sodium hydroxide — a caustic chemical — to dangerous levels. The FBI and the U.S. Cybersecurity and Infrastructure Security Agency have since warned that water utilities remain a soft target for foreign hackers.

On Friday, Poland’s Internal Security Agency, the country’s top intelligence agency, published a report covering the last two years of the agency’s operations and threats the country faced. The report said Polish intelligence thwarted multiple acts of sabotage from Russian government spies and hackers, who targeted military facilities, critical infrastructure (essential systems such as power grids, water supplies, and transportation networks), as well as civilian targets. These attacks, according to the report, may have resulted in fatalities.  

“The most serious challenge remains the sabotage activity against Poland, inspired and organized by Russian intelligence services. This threat was (and is) real and immediate. It requires full mobilization,” read the report.

The report did not specify whether the hackers behind the attacks on the water treatment facilities were Russian government spies. But Poland has recently been the target of several attempts by Russian government hackers to attack its infrastructure, including a failed attempt to bring down the country’s energy grid. That breach was later attributed to poor security controls at the targeted facilities.

Poland’s experience is part of a growing global pattern of attacks on water and energy infrastructure. As recently as last month, a joint advisory from the Cybersecurity and Infrastructure Security Agency, the FBI, the NSA, and several other federal agencies warned that Iranian-backed hackers are actively targeting programmable logic controllers — the industrial computers that run water and energy facilities — at U.S. utilities. The same Iranian hacking group, CyberAv3ngers, previously broke into digital control panels at multiple U.S. water treatment plants in Pennsylvania in 2023, in attacks that federal agencies linked to escalating hostilities in the Middle East.

In other words, the attacks against Poland are not unique, they follow a strategy that the Russian government is applying both in war zones such as Ukraine, as well as against Western countries that it sees as longstanding enemies. The plan, according to Polish intelligence, is to destabilize and weaken the West, and cyberattacks and cyberespionage are just tools in a larger toolkit for Putin’s regime.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

source

Continue Reading