Weaponized USB devices as an attack vector
Credit to Author: Alex Perekalin| Date: Wed, 17 Apr 2019 11:42:14 +0000
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Read more