Category: Exfiltration
-
+
+
+
+
+
+
There is reportedly a new particularly advanced USB-savvy malware being called "USB Thief" (Google Search) being discussed by many in the technology press. If you allow users (including system admins) to use USB storage devices on air gapped systems then this threat can be a potential attack vector a persistent…
-
+
+
+
+
+
+
There is a new open source effort to build out a working data exfiltration toolkit using radio frequencies. The source code has been posted to GitHub. More info on the news at Softpedia. The key defensive measure would be to make sure no malicious rogue capabilities make it to your…