PowerShell-based attacks have long been a nightmare for IT security divisions, because they barely leave a trace and can gain access to an impressive range of system functions. We’re at a point where IT security divisions really need a tool to gain control of the situation, or even stay one step ahead.This paper was written in 2016 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20160407 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture
Understanding the techniques used in attacks helps in detecting them. MITRE ATT&CK Enterprise Matrix...
The internet is not a safe place, threat actors are exploiting vulnerabilities to compromise compani...
Companies have solutions implemented that are designed to protect them against viruses: Strategies, ...
PowerShell monitoring [1] is one of the measures we strongly recommend to our clients as part of eve...
Perl is considered to be the Swiss Army Knife among programming languages. This title could soon be ...
International audienceDigitization is the era of today, and today's success is measured based on the...
It is of vital importance to screen the development of new or the further development of already exi...
PowerShell is a tool with many uses. In earlier Labs articles, I have covered the basics [1] of Powe...
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoo...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
For the past 15 years, the subject of Intrusion Prevention Systems (IPS) has been present in the hea...
This thesis was done for the Product Security Incident Response Team (PSIRT) of a large IT company....
Every specialist area has its hot topics. In IT security, it's web application security. Web applica...
Companies typically have sophisticated security incident procedures in place to handle all kinds of ...
Understanding the techniques used in attacks helps in detecting them. MITRE ATT&CK Enterprise Matrix...
The internet is not a safe place, threat actors are exploiting vulnerabilities to compromise compani...
Companies have solutions implemented that are designed to protect them against viruses: Strategies, ...
PowerShell monitoring [1] is one of the measures we strongly recommend to our clients as part of eve...
Perl is considered to be the Swiss Army Knife among programming languages. This title could soon be ...
International audienceDigitization is the era of today, and today's success is measured based on the...
It is of vital importance to screen the development of new or the further development of already exi...
PowerShell is a tool with many uses. In earlier Labs articles, I have covered the basics [1] of Powe...
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoo...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
For the past 15 years, the subject of Intrusion Prevention Systems (IPS) has been present in the hea...
This thesis was done for the Product Security Incident Response Team (PSIRT) of a large IT company....
Every specialist area has its hot topics. In IT security, it's web application security. Web applica...
Companies typically have sophisticated security incident procedures in place to handle all kinds of ...
Understanding the techniques used in attacks helps in detecting them. MITRE ATT&CK Enterprise Matrix...
The internet is not a safe place, threat actors are exploiting vulnerabilities to compromise compani...
Companies have solutions implemented that are designed to protect them against viruses: Strategies, ...