Lock Down PowerShell or Else!
How attackers leverage PowerShell bypass policies to gain access to your network and how Blumira enables you to detect, alert and respond to these attacks.
Read MoreAnalysis of a Threat: PowerShell Malicious Activity
An in-depth breakdown of an analysis of a real threat detected by Blumira and our recommended security mitigations.
Read More