Thunderspy and Your Cybersecurity Program with a picture of a lightning strike

Thunderspy And Your Cybersecurity Program

A newly released set of vulnerabilities termed “Thunderspy” allow an attacker with physical access to your encrypted computer in sleep mode (not powered off and not hibernated) to take full control of your system utilizing a Thunderbolt port. In this compelling video, Thunderspy’s author, Bj√∂rn Ruytenberg, demonstrates bypassing the Windows lock screen in under five minutes using a set of …