
Episode 50: How Attackers Use PowerShell
The Cyber Threat Perspective
00:00
Exploiting PowerShell: Bypasses and Security Challenges
This chapter explores how attackers leverage PowerShell to bypass security measures, particularly through techniques like deletion of defender signatures and AMZ bypasses. It underscores the importance of monitoring and logging in PowerShell to mitigate these evolving threats.
Transcript
Play full episode