"The enemy does not check your risk register prior to attacking." - Sun Tzu, The Art of Cyber War
📚 SecMisc
PoisonTap - Exploiting locked computers through USB peripherals, demonstrating techniques to bypass security measures on locked machines. Re...