misk to Technology@lemmy.worldEnglish · 1 month agoTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.comexternal-linkmessage-square46fedilinkarrow-up1216arrow-down16cross-posted to: techsploits@reddthat.comtechnology@lemmy.ziparstechnica_index@rss.ponder.cat
arrow-up1210arrow-down1external-linkTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.commisk to Technology@lemmy.worldEnglish · 1 month agomessage-square46fedilinkcross-posted to: techsploits@reddthat.comtechnology@lemmy.ziparstechnica_index@rss.ponder.cat
minus-squarestealth_cookies@lemmy.calinkfedilinkEnglisharrow-up3·1 month agoYou can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.
You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.