Back To Top

hello@commercis.com
+44 (0) 203 318 1500
Briefs

Defending against HID-Based USB intrusions, the next frontier in endpoint security.

In 2024, cyber defenders began shifting from reactive incident response toward proactive detection of hardware-level threats — particularly attacks using disguised USB devices that impersonate trusted human input peripherals. These attacks don’t rely on malware — they emulate a legitimate keyboard, injecting rapid-fire commands the moment they’re connected. Because operating systems inherently trust keyboards, these intrusions can bypass traditional antivirus, EDR and even zero-trust policies if not specifically prepared for HID-level exploitation. ...

Continue Reading

Sign in to access the full article and unlock all premium content.

Get unlimited access to all articles