• Home
  • Back to Basics
  • Malware Analysis
    • PMA Labs
  • RE 101
  • Threat Lab
  • Resources
  • About Me

Site logo

Satyajit Daulaguphu
https://tech-zealots.com

Malware Analysis

Beginners Guide To Malware Analysis Path – Part 1

By Satyajit Daulaguphu on Saturday, March 24, 2018
Malware Analysis

Malware Analysis is an art of dissecting malware functions to understand its functioning like what it does behind the scene, how it works and you can defeat or what steps you will take into consideration for its elimination. Carefully analyzing the suspecting malware and its functions will help us in creating both host-based and network …

Continue Reading
0
Threat Lab

How Crooks Are Adopting New Techniques To Phish Users

By Satyajit Daulaguphu on Wednesday, March 21, 2018
Phishing Techniques

I have observed a new but more of an old-school technique, attackers are adopting to phish the unsuspecting users and glean their credentials. And seriously this was a clever attempt. This was a case of SPAM mail that we received and after my full investigation on that Incident, this case encouraged me to write the …

Continue Reading
2
Back to Basics

Malware And It’s Various Forms

By Satyajit Daulaguphu on Monday, March 5, 2018
Malware Types

Malware Analysis is one of the hot topics you will find on the internet out today and it also possesses its core importance in the security field. Today is an era where every single company, be it’s small or big, is being hit with the cyber attacks. As we have already seen the case of …

Continue Reading
0

Posts navigation

← Previous 1 2 3 4
About The Author
Satyajit Daulaguphu
Satyajit Daulaguphu

Security blogger and currently a Research Scientist at FireEye. He feels security is his daily cup of coffee.

Follow Me
Donate on Ko-fi
Categories
  • Back to Basics
  • Malware Analysis
  • Reverse Engineering
  • Threat Lab
Subscribe Us
Get our latest articles on Malware Analysis & threat research delivered to your inbox!

Recent Posts
  • So, Emotet’s Back Huh…
  • How To Quickly Extract Malicious Macros From Document & Triage Incident
  • Dissecting WannaCry Ransomware To It’s Core – Technical Analysis
  • Understanding Concepts Of VA, RVA and Offset
  • A Journey Towards an Import Address Table (IAT) of an Executable File
  • DeObfuscating #Emotet’s Malicious VBA Macro Like a Pro!!
  • Dissecting Manual Unpacking of a UPX Packed File
Recent Comments
  • Muhammad Hassoub on So, Emotet’s Back Huh…
  • Jeha on Understanding Concepts Of VA, RVA and Offset
  • Thanursan on Understanding Concepts Of VA, RVA and Offset
  • Satya on Understanding Concepts Of VA, RVA and Offset
  • Thanursan on Understanding Concepts Of VA, RVA and Offset
Advertisement
Support Brave

Resources
  • About Me
  • Cookies Policy
  • Privacy Policy
  • Resources
  • Reverse Engineering Basics
Recent Posts
  • So, Emotet’s Back Huh…
  • How To Quickly Extract Malicious Macros From Document & Triage Incident
  • Dissecting WannaCry Ransomware To It’s Core – Technical Analysis
  • Understanding Concepts Of VA, RVA and Offset
Newsletter
Get our latest articles on Malware Analysis & threat research delivered to your inbox!

© 2020 Tech Zealots. All rights reserved.