Hid attack Prevention & Mitigation
HID attacks have gradually made up as one of the major cyberspace threats that currently exist as far as current exploitations by decent operating systems are concerned, intended only for trusting USB devices. The attacks included the use of compromised USB devices for payload delivery using applications such as BadUSB and Rubber Ducky in commands to avoid security mechanisms and gain unauthorized access to the system's mechanisms.