How Malware Uses Powershell
With malicious parties continuing to use Powershell as their way in, I thought I would look into how it’s being used and what can be done to prevent it. This is something I’ve covered before, so think of this as a part 3:
Part 1: https://securethelogs.com/hacking-with-powershell-blue-team/
Part 2: https://securethelogs.com/hacking-with-powershell-red-team/