Follow

: day 28d : Doing some Attack Chain threat modeling. After getting a and playing with BadUSB, I've gotten my hands on a Rubber Duckie. Looking at I notice the only BadUSB references are in footnotes! I think it fits as either Hardware Additions or as a Phishing technique. What say you and , since it's not explicitly called out as a technique, do I infer this as "not likely"?

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.