Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
AAI Security

Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)

  • bySatyajit Daulaguphu
  • June 24, 2025
To understand LotL-AI, one must first grasp its predecessor. “Living off the Land” attacks are characterized by their…
PE structure
Read More
    MMalware Analysis

    Mastering PE Structure for Malware Analysis: A Layman’s Guide

    • bySatyajit Daulaguphu
    • August 15, 2022
    In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
    Living off the AI attacks
    Read More
      AAI Security

      Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)

      • bySatyajit Daulaguphu
      • June 24, 2025
      To understand LotL-AI, one must first grasp its predecessor. “Living off the Land” attacks are characterized by their…
      code obfuscation techniques
      Read More
        TThreat Lab

        Code Obfuscation: 10 Powerful Techniques for Maximum Security!

        • bySatyajit Daulaguphu
        • October 12, 2023
        What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
        DLL side loading technique leveraged by Qakbot to carry out its attack
        Read More
          MMalware Analysis

          How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

          • bySatyajit Daulaguphu
          • November 5, 2022
          QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
          Best Computer for Cyber Security
          Read More
            TTech Bytes

            What Is the Best Computer for Cyber Security? 8 Options

            • bySatyajit Daulaguphu
            • August 23, 2022
            Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
            about
            About Me

            Satyajit Daulaguphu

            Satyajit brings over 8 years of expertise in Cyber Security to his role as a Threat Detection Engineer at Trellix, focusing on malware research, threat detection, and blog writing.

            Support Tech Zealots

            Subscribe to Our Newsletter

            Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

            Tech Zealots
            © 2023. All Rights Reserved.
            • Privacy Policy
            • Cookies Policy
            • Write for Us