AAI SecurityLiving off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)bySatyajit DaulaguphuJune 24, 2025 To understand LotL-AI, one must first grasp its predecessor. “Living off the Land” attacks are characterized by their…
Read More MMalware AnalysisMastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
Read More AAI SecurityLiving off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)bySatyajit DaulaguphuJune 24, 2025 To understand LotL-AI, one must first grasp its predecessor. “Living off the Land” attacks are characterized by their…
Read More TThreat LabCode Obfuscation: 10 Powerful Techniques for Maximum Security!bySatyajit DaulaguphuOctober 12, 2023 What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
Read More MMalware AnalysisHow QakBot Leverages DLL Side Loading Technique? – Technical AnalysisbySatyajit DaulaguphuNovember 5, 2022 QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
Read More TTech BytesWhat Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…