Are Thunderbolt-enabled computers without Thunderbolt ports vulnerable to Thunderspy?
Could these two attack scenarios exploit the recently publicized vulnerability?
Using a Thunderbolt adapter like an USB-to-Thunderbolt adapter on a computer without any Thunderbolt port
Temporarily replacing hardware (mainboard) with har… Continue reading Are Thunderbolt-enabled computers without Thunderbolt ports vulnerable to Thunderspy?