Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Run a PowerShell Script

PowerShell is a scripting language and command-line shell designed for task automation and configuration management, primarily used by system administrators and advanced users. Built on the.NET framework (.Net Core for PowerShell 7), it supports Windows, Linux and macOS. It enables automation of administrative tasks such as managing user accounts, configuring networks and performing backups, thereby reducing human error.

What is Credential Stuffing?

Credential stuffing is a type of cyberattack where attackers use stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to multiple online accounts. The attacker automates the process of trying these combinations across various websites, hoping that users have reused the same login details.

How to Update PowerShell

Each new PowerShell version introduces new features, performance enhancements, and security improvements. Upgrading empowers you to take advantage of these advancements. It also ensures compatibility with updated APIs, libraries, and frameworks and provides access to contributions from a vibrant community committed to knowledge sharing and best practices.

Rainbow Table Attacks: How They Work and How to Defend Against Them

Many common password attack methods are quite straightforward — much like trying various physical keys to open the lock on a door. For example, in brute force attacks, adversaries systematically guess passwords until they find the correct one. Or instead of simply guessing, they can use a list of username/password combinations leaked from other breaches (credential stuffing) or cycle through known usernames combined with commonly used passwords (password spraying).

Why PowerShell Send-MailMessage Is Deprecated and What to Use Instead

PowerShell is an indispensable tool for task automation, configuration management, system monitoring and querying data. But you can also send email with PowerShell. For instance, PowerShell scripts can monitor systems and post email alerts for specific events, resource constraints or completed tasks. However, it’s critical to ensure that emails are sent in a secure manner.

PowerShell vs CMD: The Ultimate Guide for Windows Professionals

Windows PowerShell and command prompt (CMD) are both essential command-line interface tools for Windows administrators, allowing them to execute commands, manage system processes and automate administrative tasks. While CMD has been a foundational component of Windows since the MS-DOS era, PowerShell has emerged as a more advanced and powerful scripting language, enhancing system management and automation capabilities.

The Largest and Most Notorious Cyber Attacks in History

Cyber attacks are deliberate attempts to steal, alter, or destroy data or to disrupt operations and to damage the digital parts of a critical infrastructure. This blog post explores the most destructive major cyber attacks in history, detailing the underlying motives and impact, and then offers prevention and detection best practices.

What is OAuth (Open Authorization)?

OAuth is an authorization protocol that grants third-party websites or applications limited access to a user’s information (like their email or photos) — without sharing their logon credentials. For example, suppose you want to sign up for an app to help you track your fitness goals. Through the power of OAuth, you may have the option to log in using your Google account rather than create a new account specific to the fitness application.

How to Run PowerShell on Remote Computers

PowerShell is a great scripting and automation tool — and it also enables administrators to execute commands and scripts on remote computers remotely, as if they were sitting in front of them. Indeed, early in the history of PowerShell, Microsoft added support for cmdlets to run on remote systems with the -ComputerName parameter.