Monday 6 March 2017

Report: PowerShell Trojan Uses DNS Queries

A targeted attack that's delivered by a malicious Word doc was uncovered by researchers at Cisco's Talos threat research group. The PowerShell scripts do a remarkable job of hiding its intentions and uses the Domain Name Service (DNS) to execute. MORE: DD

from Tom's IT Pro
via CERTIVIEW

No comments:

Post a Comment