TTech BytesHow Does API Testing Fit into an Overall Application Security Strategy?bySatyajit DaulaguphuSeptember 3, 2025 Key Takeaways Introduction to API Security In today’s hyper-connected world, the digital economy runs on data. Every mobile…
Read More MMalware AnalysisMastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
Read More TTech BytesHow Does API Testing Fit into an Overall Application Security Strategy?bySatyajit DaulaguphuSeptember 3, 2025 Key Takeaways Introduction to API Security In today’s hyper-connected world, the digital economy runs on data. Every mobile…
Read More TTech Bytes10 Powerful Cybersecurity Career Trends and How to Prepare for Them?bySatyajit DaulaguphuAugust 5, 2025 In today’s hyper-coupled world, cybersecurity has become one of the most important and fastest-growing fields. Growing rapidly with…
Read More TThreat LabCVE-2025-32463 Critical Sudo Chroot Exploit: Complete Detection & Remediation GuidebySatyajit DaulaguphuJuly 11, 2025 On June 30, 2025, the team at Stratascale Cyber Research Unit (CRU) identified a local privilege escalation vulnerability…
Read More AAI SecurityLiving off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)bySatyajit DaulaguphuJune 24, 2025 To understand LotL-AI (Living off the AI), one must first understand the term Living off the Land or…
Read More TThreat LabCode Obfuscation: 10 Powerful Techniques for Maximum Security!bySatyajit DaulaguphuOctober 12, 2023 What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
Read More MMalware AnalysisHow QakBot Leverages DLL Side Loading Technique? – Technical AnalysisbySatyajit DaulaguphuNovember 5, 2022 QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…