The Cyber Threat Perspective cover image

Episode 50: How Attackers Use PowerShell

The Cyber Threat Perspective

00:00

Exploiting PowerShell: Bypasses and Security Challenges

This chapter explores how attackers leverage PowerShell to bypass security measures, particularly through techniques like deletion of defender signatures and AMZ bypasses. It underscores the importance of monitoring and logging in PowerShell to mitigate these evolving threats.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app