1. Home
  2. Knowledge Base
  3. Rules

How to run PowerShell scripts at Startup

It is important that PowerShell scripts designed to run at startup use the correct techniques so they are not detected as possible threats which use deceptive commands to bypass system security.
  • 1

Cryptocurrency Mining Prevention

Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency.
  • 0

Multiple Layers of Protection

BlackFog consists of multiple layers of protection to combat the increasing sophistication of cyber attacks. Using BlackFog's unique outbound network defense strategy it is possible to target the attack and multiple points.
  • 5

PowerShell Attack Prevention

PowerShell attacks are now the preferred weapon of choice for many of these attacks because it provides a number of techniques for bypassing existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
  • 1

Dark Web Network Protection

The Dark Web Network Blocking option is an important security measure to prevent data loss, activation and transfer of malware over the Internet.
  • 2