Weaponized USB devices as an attack vector

Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.