Why are IT Professionals filling their USB ports with glue.?
To the average user, a rubber ducky looks like another USB device. Really, they imitate keyboards and gain your device’s trust to deliver payloads by injecting keystrokes.
Danny Jenkins, Rob Allen, and Ivan Fonseca demonstrate how threat actors can use rubber duckies to spy on you and your employees through your webcam!
Watch the webinar recording to:
Read more about Rubber Duckies in this ThreatLocker blog
Watch our webinar on Rubber Duckies from a year prior where Danny blue screened Rob's machine!
Request your 30-day trial to the entire ThreatLocker platform today.
Try ThreatLocker