by Frank Ully
This is the second article in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT security managers can prevent them in the first place. This article looks at the features that make PowerShell so popular as an attack tool. [read the German article]