That is word for word what is written on a
3 year old "Cyberreason" blog post. It's just more security circus bullcrap, in this case they are talking up the "danger" in order to sell their crappy security product. Are you a spammer too?
From the blog post in question:
Traditional approaches to security are rendered useless in the face of these attacks because PowerShell is highly reputable, has a trusted signature, is loaded directly through system memory (which cannot be scanned using heuristics) and has unrestricted access to the OS because it’s an integral part of Windows.
What a load of garbage. "loaded through system memory"? What is that supposed to mean? What applications
aren't loaded through "system memory"? Do they mean that Power shell is in the Windows System folders? If so, do they
not know the difference between Memory and Storage? and if that is the case
why should they be trusted for anything computer-related?. It's like going to an electrician only to find out they don't know the difference between static electricity and current electricity.
They also leave out that this still requires access to the machine.... the attack still has to run powershell to begin with. It's talking up the danger in order to sell their crap, just like every security endpoint vendor. "Buy our product to protect yourself from internet boogeymen".