Sunday, December 1, 2024

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

USB

a USB drive

A Major Industrial Cybersecurity Threat: Living off the Land Attacks

Nathan Eddy | May 31, 2024 | commercial infrastructure, CPS, Cyber-Physical Systems, Honeywell, ICS, industrial control systems, iot, living off the land, lotl, operational technology, USB
In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard

Why USB Attacks Are Back and How to Prevent Them

Kevin Smith | March 18, 2024 | Blog, Threats and Trends, USB
When we think about modern cyber threats, USB drives and keys are probably not the ...
Blog – Coro Cybersecurity
A closeup of a USB drive

‘LitterDrifter’ Russian USB Worm Leaks from Ukraine War Zone

Richi Jennings | November 22, 2023 | APT, Aqua Blizzard, Armageddon, computer worm, Flash drive, FSB, Gamaredon, Iron Tilden, LitterDrifter, Malware, Primitive Bear, Russia, russia hacker, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, Russian Cyber War, Russian cybercrime, Russian FSB, SB Blogwatch, self-replicating worm, Shuckworm, Trident Ursa, Ukraine, ukraine conflict, Ukraine Cyber War, Ukraine cyberattack, Ukraine/European Security, USB, USB malware, USB Sticks, worm, worms
FSB APT USB VBS LNK DLL: WTH? Flash drive sharing malware escapes Україна. Gamaredon fingered as perps ...
Security Boulevard

USB “Rubber Ducky” Attack Tool

Bruce Schneier | August 18, 2022 | cyberattack, Cybersecurity, Hacking, Uncategorized, USB
The USB Rubber Ducky is getting better and better. Already, previous versions of the Rubber Ducky could carry out attacks like creating a fake Windows pop-up box to harvest a user’s login ...
Schneier on Security

Malicious USB drives are being posted to businesses

Graham Cluley | January 13, 2022 | FBI, IT Security and Data Protection, Malware, Ransomware, USB
A notorious cybercrime gang, involved in a series of high profile ransomware attacks, has in recent months been sending out poisoned USB devices to US organisations. As The Record reports, the FBI ...
The State of Security

Report: USB threats to ICS systems have nearly doubled

Anastasios Arampatzis | April 1, 2021 | cyberattacks, Honeywell, ICS Security, operational technology, USB, USB attack
The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of ...
The State of Security
VictoryGate Monero-Mining Botnet Spread via Infected USB Devices

VictoryGate Monero-Mining Botnet Spread via Infected USB Devices

David Bisson | April 23, 2020 | botnet, cryptomining, IT Security and Data Protection, Latest Security News, Monero, USB, VictoryGate
A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm ESET revealed that it had sinkholed several command-and-control (C&C) domains so that ...
The State of Security
USB Flash Drive Malware: How It Works & How to Protect Against It

USB Flash Drive Malware: How It Works & How to Protect Against It

Richard Lecount | December 17, 2019 | Hashing Out Cyber Security, Malware, USB, usb drive malware
From the University of Illinois to Iran (and everywhere in-between), USB flash drive malware is a serious risk Back in 2016, researchers from the University of Illinois left nearly 300... The post ...
Hashed Out by The SSL Store™
Don’t Forget to Pack a USB Condom When Traveling

Don’t Forget to Pack a USB Condom When Traveling

Silviu STAHIE | December 10, 2019 | Hackers, Industry News, Juice jacking, USB
The only way to prevent juice jacking is to use a USB condom, which is not as crazy as it might sound. Hackers are looking for new ways to compromise people’s computers, ...
HOTforSecurity

Man fried over 50 college computers with weaponized USB stick

Graham Cluley | April 18, 2019 | backups, BadUSB, Featured Articles, IT Security and Data Protection, USB
Vishwanath Akuthota's USB stick contained an unusually destructive payload. The post Man fried over 50 college computers with weaponized USB stick appeared first on The State of Security ...
The State of Security
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Mobility Field Day

Upcoming Webinars

Hacker Tactic: Avoid Blind Spots with Your Windows Event Logs
Simplifying Network Access: Secure Modern Connectivity with Tailscale
Staying Ahead: Top Internet Trends Shaping Networking and Security
DevSecOps “Friends”, Webinar Series: The One with Platform Engineering (and the Happy Developers)
Managing Dependencies at Enterprise Scale

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Protecting Web-Based Work: Connecting People, Web Browsers and Security
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

Industry Spotlight

QNAP’s Buggy Security Fix Causes Chaos
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

QNAP’s Buggy Security Fix Causes Chaos

November 26, 2024 Richi Jennings | Nov 26 0
U.S. Agencies Seize Four North Korean IT Worker Scam Websites
Cloud Security Cybersecurity Data Security DevOps Endpoint Featured Identity & Access Industry Spotlight Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

U.S. Agencies Seize Four North Korean IT Worker Scam Websites

November 22, 2024 Jeffrey Burt | Nov 22 0
Here’s Yet Another D-Link RCE That Won’t be Fixed
Application Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Here’s Yet Another D-Link RCE That Won’t be Fixed

November 21, 2024 Richi Jennings | Nov 21 0

Top Stories

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’

November 27, 2024 Jeffrey Burt | 4 days ago 0
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform
Application Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X 

Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

November 27, 2024 Michael Vizard | 4 days ago 0
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

November 26, 2024 Jeffrey Burt | Nov 26 0

Download Free eBook

7 Must-Read eBooks for Security Professionals

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2024 Techstrong Group Inc. All rights reserved.
×