Hackers Are Loving PowerShell, Study Finds

Data gathered from 10,000 confirmed threats reveals that PowerShell, scripting, Regsvr32, connection proxy, spearphishing attachments and masquerading were the most prevalent techniques, as described in MITRE’s Adversarial Tactics Techniques and Common Knowledge (ATT&CK) framework, according to Red Canary’s just-released Threat Detection Report.

Read More