TThreat LabCode Obfuscation: 10 Powerful Techniques for Maximum Security!bySatyajit DaulaguphuOctober 12, 2023 What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
Read More MMalware AnalysisA Comprehensive Guide To PE Structure, The Layman’s WaybySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
Read More TThreat LabCode Obfuscation: 10 Powerful Techniques for Maximum Security!bySatyajit DaulaguphuOctober 12, 2023 What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
Read More MMalware AnalysisHow QakBot Leverages DLL Side Loading Technique? – Technical AnalysisbySatyajit DaulaguphuNovember 5, 2022 QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
Read More TTech BytesWhat Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
Read More MMalware Analysis11 Critical Malware Persistence Mechanisms You Should Be Familiar With!bySatyajit DaulaguphuApril 7, 2022 In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…