Login
From:
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
(Uncensored)
subscribe
PowerShell Loaders Use In-Memory Execution to Evade Disk-Based Detection
https://gbhackers.com/powershell-loaders-use-in-memory-execution/
links
backlinks
A recent threat hunting session has revealed a sophisticated PowerShell script, named y1.ps1, hosted in an open directory on a Chinese server.
Roast topics
Find topics
Find it!