misk to Technology@lemmy.worldEnglish · 2 months agoTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.comexternal-linkmessage-square46fedilinkarrow-up1216arrow-down16cross-posted to: techsploits@reddthat.comtechnology@lemmy.ziparstechnica_index@rss.ponder.cat
arrow-up1210arrow-down1external-linkTwo never-before-seen tools, from same group, infect air-gapped devicesarstechnica.commisk to Technology@lemmy.worldEnglish · 2 months agomessage-square46fedilinkcross-posted to: techsploits@reddthat.comtechnology@lemmy.ziparstechnica_index@rss.ponder.cat
minus-squarestealth_cookies@lemmy.calinkfedilinkEnglisharrow-up3·2 months agoYou can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.
You can greatly reduce the attack surface by limiting device use to specific users or maybe even specific devices that are controlled.