Henrik Falk April 30, 2026
Social Engineering: Building Your Own BadUSB
The most popular form factor is still the classic USB flash drive because it naturally fits what people expect to see in an office or meeting room. But the hardware is so compact that it can be hidden almost anywhere. It can live inside a webcam shell, be embedded in a USB hub, or even be disguised inside a cable such as the O.MG Cable.
hackers-arise.com/badusb-hid-building-your-own-badusb
Old skool tales on initial access
Recently when talking to some friends, who are still enjoying the art of breaking in by being part of a red team, I was reminded by them how much more difficult initial access has gotten. I decided to write up some old stories in a bit more detail and well; admit that when companies implement advice and do stuff, cyber does have an impact.
DiabloHorn
Hacking drones in every possible way: a comprehensive analysis of UAV cybersecurity.
Using DJI Phantom 4 Pro V2.0 as a reference, the authors build a generic UAV architecture and communication protocol (MAVLink), mapping key attack vectors, risks, and the most interesting vulnerabilities.
Denis Laskov