If you have written traditional #DSC resources and want an easy way to migrate them to class-based resources, take a look at https://github.com/jdhitsolutions/DSCResourceMigration #PowerShell

If you have written traditional #DSC resources and want an easy way to migrate them to class-based resources, take a look at https://github.com/jdhitsolutions/DSCResourceMigration #PowerShell
Keep up to date with the latest updates in the #PowerShell Gallery with these reports. https://github.com/jdhitsolutions/PSGalleryReport
I finally published a long-overdue update to the MySqlite module to the #PowerShell Gallery. Numerous bug fixes and improvements. The big change is that the module now supports ARM64 on Windows. https://github.com/jdhitsolutions/MySQLite
Looking to learn more about #PowerShell? Check out the offerings from Leanpub. https://leanpub.com/bookstore?type=all&search=powershell
Just dropped the latest edition of PowerShell Weekly for May 30, 2025! Dive into the freshest scripts and tips to supercharge your workflow. Don’t miss out!
#PowerShell #Automation #TechNews
https://psweekly.dowst.dev/?p=7893
Discover how #PowerShell notebooks can solve dependency issues across different machines and cloud pipelines! Learn about seamless documentation, collaboration, and execution of scripts in this insightful session with David Sass. #PSConfEU
Execute Notebooks everywhere -...
New Malware Spotted Corrupts Its Own Headers to Block Analysis https://hackread.com/new-malware-corrupts-its-headers-block-analysis/ #Cybersecurity #FortiGuard #PowerShell #Security #Fortinet #Malware #Windows #TROJAN #DoS #RAT
I love teaching people how to make awesome #PowerShell tools. If you haven't done so, grab one of the few remaining tickets. https://wpninjas.uk/
New Malware Spotted Corrupts Its Own Headers to Block Analysis – Source:hackread.com https://ciso2ciso.com/new-malware-spotted-corrupts-its-own-headers-to-block-analysis-sourcehackread-com/ #1CyberSecurityNewsPost #CyberSecurityNews #cybersecurity #FortiGuard #PowerShell #Fortinet #Hackread #security #malware #Windows #trojan #DoS #RAT
@mrgrumpymonkey depends...
Next logical step is some #PowerShell script that downloads a #Linux distro image, repartition the system drive, add some unallocated space at the end, put a #CloudInit config in it and then do an #UnattendedInstall of said system with bcd
by calling up #bcdedit to #chainload said partition.
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
A novel Rust-based infostealer called EDDIESTEALER has been discovered, distributed through fake CAPTCHA campaigns. The malware uses deceptive verification pages to trick users into executing a malicious PowerShell script, which deploys the infostealer. EDDIESTEALER targets sensitive data including credentials, browser information, and cryptocurrency wallet details. It communicates with a command and control server to receive tasks and exfiltrate data. The malware employs string obfuscation, API obfuscation, and other evasion techniques. It specifically targets various crypto wallets, browsers, password managers, FTP clients, and messaging applications. The use of Rust in its development reflects a growing trend among threat actors seeking enhanced stealth and resilience against traditional analysis methods.
Pulse ID: 6838b480f31c059165ae1733
Pulse Link: https://otx.alienvault.com/pulse/6838b480f31c059165ae1733
Pulse Author: AlienVault
Created: 2025-05-29 19:24:48
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses https://gbhackers.com/purehvnc-rat-uses-fake-job-offers-and-powershell/ #CyberSecurityNews #cybersecurity #PowerShell #Malware
Tickets for #PSConfEU are just about gone. Last minute tickets are just as good as the first ticket. #PowerShell https://psconf.eu
Can't make it to the #PowerShell Summit? These books are the next best thing. All sales benefit the On Ramp scholarship fund. https://leanpub.com/bookstore?type=all&search=powershell%20conference
Cybercriminals camouflaging threats as AI tool installers
Cisco Talos has uncovered new threats disguised as legitimate AI tool installers, including CyberLock ransomware, Lucky_Gh0$t ransomware, and a newly-discovered malware called Numero. These threats exploit the increasing popularity of AI across various industries. CyberLock, developed using PowerShell, encrypts specific files and demands a $50,000 ransom in Monero. Lucky_Gh0$t is a variant of Yashma ransomware, distributed as a fake ChatGPT installer. Numero, masquerading as an AI video creation tool, manipulates the Windows GUI, rendering systems unusable. Threat actors are using SEO poisoning and social media to distribute these fraudulent installers, targeting businesses in B2B sales, technology, and marketing sectors. Organizations must exercise caution and rely on reputable vendors to avoid falling prey to these malicious campaigns.
Pulse ID: 683877ce5988443994d884f3
Pulse Link: https://otx.alienvault.com/pulse/683877ce5988443994d884f3
Pulse Author: AlienVault
Created: 2025-05-29 15:05:50
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
New Malware Spooted Corrupts Its Own Headers to Block Analysis – Source:hackread.com https://ciso2ciso.com/new-malware-spooted-corrupts-its-own-headers-to-block-analysis-sourcehackread-com/ #1CyberSecurityNewsPost #CyberSecurityNews #cybersecurity #FortiGuard #PowerShell #Fortinet #Hackread #security #malware #Windows #trojan #DoS #RAT
Practical Graph: Working with Calendar Events Using Graph APIs
Calendar events make up user and group calendars. It's possible to create, update, cancel, and remove calendar appointments and meetings, including recurring events, through the Graph API. This article explains how to pass all the properties needed to create and manage events using PowerShell and the Graph APIs.
https://practical365.com/calendar-events-graph-api/
#PowerShell #MicrosoftGraph #Microsoft365
If our paths will cross in the next few weeks either at WorkPlace Ninjas UK or #PSConfEU, and you want a book signed, don't hesitate to bring it and track me down. #PowerShell #MonthOfLunches