This is still golden, while is is also super provocative about #PowerShell Do developers really dislike PowerShe
Do developers really dislike PowerShell?

PowerShell (or PWSH if you prefer). Devops (especially Azure Devops), Photography, and general thoughts

Going live for #PowerShell Wednesday with Greg Martin at 2pm ET.

Today we are learning about text manipulation in PowerShell. Logs, configs, text of any kind.

Join us live or watch after-the-fact

https://www.youtube.com/watch?v=uWfSbuYnpFA

PowerShell Text Manipulation Basics

YouTube
MiniCon is back! Join the PSConfEU community on 14 October 2025. Secure your free ticket πŸ‘‰ 🎟️ ti.to/synedgy/psconfeu-mini... #DevOps #PSConfEU #MiniCon2025 #Automation #PowerShell #TechLeaders #DevOpsEngineers #SRE #SysAdminTools
On this edition of PohBytes, a showdown for the ages, Arrays vs. Lists!
Two contenders, two minutes, no fluff, many .Add()s and +=s.
Watch now β†’ https://youtube.com/shorts/ADUEvYtJu6Q
#PowerShell #Scripting #Automation
Before you continue to YouTube

XiebroC2 Identified in MS-SQL Server Attack Cases

A recent attack on a poorly managed MS-SQL server involved the use of XiebroC2, an open-source C2 framework similar to CobaltStrike. The attackers exploited vulnerable credentials, installed JuicyPotato for privilege escalation, and then deployed XiebroC2 using PowerShell. XiebroC2 supports various features including remote control, information collection, and defense evasion across multiple platforms. The malware collects system information and connects to a C&C server for command execution. To protect against such attacks, administrators are advised to use complex passwords, regularly update them, keep security software current, and implement firewalls to restrict external access to publicly accessible database servers.

Pulse ID: 68dcd9f8b0915d06d4e69057
Pulse Link: https://otx.alienvault.com/pulse/68dcd9f8b0915d06d4e69057
Pulse Author: AlienVault
Created: 2025-10-01 07:36:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CandC #CobaltStrike #CyberSecurity #InfoSec #MSSQL #Malware #OTX #OpenThreatExchange #Password #Passwords #PowerShell #RAT #RCE #SQL #Word #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Woah. I just ran into a weird issue with #PowerShell that took me a bit to work around.
I have a .Net DLL with some PowerShell Cmdlets that I want to load. The problem is that the profile.ps1 already loads a much newer version of the same DLL from another path.
This here

Remove-Module abc Import-Module abc.dll

will not work!!! It will just load the newer version instead, even if I specify the full path to the other DLL.
What I ended up doing instead was this

powershell.exe -noprofile Import-Module abc.dll

. Maybe this is helpful for someone else.