
Effective Operational Outcomes - Ken Dunham - PSW #847
Paul's Security Weekly (Audio)
00:00
USB Vulnerabilities in Air-Gapped Networks
This chapter explores new tools and methods for infiltrating air gap networks, highlighting the use of USB devices for covert data exfiltration. It discusses the evolving landscape of cybersecurity threats, emphasizing the implications of supply chain vulnerabilities and the relevance of traditional USB attack strategies.
Play episode from 01:40:12
Transcript


