I’ve come across a suspicious USB device and want to analyze its contents safely. However, I’m concerned about potential malware or other risks. What are the best practices or tools for safely analyzing a USB device? Should I use a virtual machine, air-gapped system, or specialized tools? Any guidance on this process would be greatly appreciated.