Malware Questions Blog Posts
    • 14 Feb 2020

    Decoding Malicious PowerShell Activity - A Case Study

    IT Administrators and Security Specialists often run into a suspicious looking PowerShell command; sometimes they succeed in decoding them but often, they are reliant on researchers. This blog should serve as a guidance to identify the purpose of suspicious entries found in: Scheduled Tasks RUN Keys in the Registry Static PowerShell Scripts Proxy Logs if a Web Server is exploited for a Remote Code Execution...
Latest Community Questions in Malware Questions