资讯

IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
Deleting files is a common task that most computer users have to perform occasionally. In PowerShell, you can easily remove files using the handy Remove-Item cmdlet. But what if you want to check if a ...
A cybersecurity researcher has developed FileFix, a variant of the ClickFix social engineering attack that tricks users into executing malicious commands via the File Explorer address bar in Windows.
Remcos RAT deployed via fileless PowerShell attacks using LNK files and MSHTA.exe, evades disk-based defenses.
CSV, or Comma Separated Values, are files used for all kinds of things, from managing large datasets to exporting data to move it between web services. You might think CSV files are just ...
Learn how to use JSON configuration files to make PowerShell scripts more dynamic, flexible and user-friendly.
How do I export a CSV file from PowerShell? We shall be using Windows Powershell ISE as it gives you more control over your CSV files. It gives you much more flexibility in how your CSV file is formed ...