Skip to content

Category: How to’s

How to monitor and detect malicious PowerShell scripts?

In today’s threat landscape more and more threats like fileless malware and ransomware leverage PowerShell during the exploitation stage. In this post I have written some of the best ways… Read more How to monitor and detect malicious PowerShell scripts?

Installing unknown software? Read this before you proceed.

When you download software from trusted sources like Microsoft or Google you don’t have to worry much about trustworthiness. But when you download software or any files from random sites or programs sent by friends, how do you verify them? When we download file or software from unknown sites, we can scan it with our Antivirus(AV) software to check if it is safe to use or a malicious one. What if the actual file is malicious and your AV is not aware of it? Yes, it is possible. It could… Read more Installing unknown software? Read this before you proceed.