misk@sopuli.xyz to Technology@lemmy.worldEnglish · 22 days agoTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.comexternal-linkmessage-square46fedilinkarrow-up1197arrow-down16cross-posted to: techsploits@reddthat.comhackernews@lemmy.bestiver.setechnology@lemmy.zip
arrow-up1191arrow-down1external-linkTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.commisk@sopuli.xyz to Technology@lemmy.worldEnglish · 22 days agomessage-square46fedilinkcross-posted to: techsploits@reddthat.comhackernews@lemmy.bestiver.setechnology@lemmy.zip
minus-squarestealth_cookies@lemmy.calinkfedilinkEnglisharrow-up3·22 days agoYou can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.
You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.