We all have the best technical cyber security defences in place we can afford (or we should have). The threat actors know this so they are always on the hunt for those techniques that our anti-virus and filtering systems cannot detect.
PowerShell is a powerful Windows command line and automation tool and is a favourite path to compromise for threat actors. Here is a current example of a well crafted PowerShell attack, using a file name that is familiar to PowerShell users and with malicious code so well obfuscated it was completely undetected.
Undetected PowerShell Backdoor Disguised as a Profile File – SANS Internet Storm Centre
This is why you need training…
Clive Catton MSc (Cyber Security) – by-line and other articles