Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

Let’s assume:

I have a piece of software (with a webUI) that has access to a USB device.
The software itself can’t be changed.
The software has the ability to perform a firmware flash on the USB device, also remotely when uploaded through… Continue reading Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

APT trends report Q3 2024

The report features the most significant developments relating to APT groups in Q3 2024, including hacktivist activity, new APT tools and campaigns. Continue reading APT trends report Q3 2024

A "HID-compliant mouse" and a "USB composite device", both have no records in their "Device Manager – Properties – Events" [migrated]

A "HID-compliant mouse" and a "USB composite device", both have no records in their "Device Manager – Properties – Events". Both are "currently not connected".
All other "Mice and other pointing… Continue reading A "HID-compliant mouse" and a "USB composite device", both have no records in their "Device Manager – Properties – Events" [migrated]

Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

Goal:
I’m seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain highly sensitive information, and my primar… Continue reading Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model