Skip to content
Securezoo Blog
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • MalwareCyber security malware threats.
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy
Menu Close
  • Home
  • Threat Center Blog
    • Application Security
    • Cloud Security
    • Cryptography
    • Cybersecurity Articles
    • Cybersecurity Attacks
    • Identity & Access Management
    • Insider Threats
    • Internet of Things (IoT)
    • Malware
    • Network Security
    • Password Management
    • Regulations & Laws
    • Security Updates & Patches
    • Third-Party Security
    • Vulnerabilities & Exploits
    • Zero-days
  • Resources
  • Security Guidelines
    • CIS
    • PCI
    • NIST
    • Other
  • Services
    • Security Assessment
  • About Us
  • Contact Us
  • Privacy Policy

USB

  1. Home>
  2. Cybersecurity Threat Center>
  3. USB

Former student uses “USB Killer” device to destroy university computers

  • Post author:Frank Crast
  • Post published:April 18, 2019
  • Post category:Endpoint Security

A former student at the College of St. Rose, in New York used a weaponized USB stick dubbed "USB Killer" to destroy 59 university computers and seven monitors that had open USB slots.

Continue Reading Former student uses “USB Killer” device to destroy university computers

USB drives used to plant malware

  • Post author:Frank Crast
  • Post published:August 30, 2017
  • Post category:Cryptography/Endpoint Security/Malware
  • Post comments:0 Comments

USB flash drives can often be a threat to your organization as malicious insiders could use them to steal your most sensitive data. Organizations should also be aware that USB drives can also be used to plant malware, such as backdoors and fileless malware.

Continue Reading USB drives used to plant malware

Categories

Archives

RSS Securezoo Cyber Security Threat Center – Latest Posts

  • Apple releases iOS 14.4 with fixes for 3 zero-days exploited in wild (and other security updates) January 27, 2021
  • North Korean hackers target security researchers in new campaign January 26, 2021
  • SQL Server malware “MrbMiner” attacks January 25, 2021
  • Cisco patches 8 Critical SD-WAN vulnerabilities and flaws in other network products January 23, 2021
  • Drupal patches Critical third-party library vulnerability (CVE-2020-36193) January 23, 2021
  • Oracle Critical Patch Update for January 2021 January 22, 2021
  • FireEye publishes Microsoft 365 tools and hardening strategies to defend against SolarWinds attackers January 21, 2021
  • Google releases Chrome security update (88.0.4324.96) January 21, 2021
  • FreakOut malware exploits new Linux vulnerabilities January 20, 2021
  • DNSpooq: Dnsmasq vulnerabilities open up network and Linux devices to attack January 19, 2021
Copyright © 2021 Securezoo LLC. All rights reserved.