Twitter

Really Great Supply Chain Security Talk by Bunnie

If you’ve ever wondered about the different ways someone might use hardware as a way to exfiltrate data, Bunnie goes through a bunch of different exploit vectors in this talk that he shared over at his blog.


Jay Margalus is on Twitter at @jaymargalus

Comments are closed.