Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Browsing Category

Threat Lab

14 posts

Threat Lab is a platform dedicated only to the research work related to malware samples or any other technology. Find all our research related articles in Threat lab.

TThreat Lab
Emotet Macro Malware
Read More

    DeObfuscating Emotet’s Malicious VBA Macro Like a Pro!!

    • bySatyajit Daulaguphu
    • May 2, 2019
    For a very long time, I was thinking of writing an article when I received an email that…
    TThreat Lab
    Cuckoo Sandbox 2
    Read More

      How To Configure Guest Machine For Cuckoo? [Part 2]

      • bySatyajit Daulaguphu
      • March 18, 2019
      This post is a continuation to the earlier part – How To Install and Get Cuckoo Sandbox Working…
      TThreat Lab
      Office 365 Spear Phishing attack
      Read More

        How Cyber Criminals Are Abusing Microsoft Domain to Deliver Phishing Mails

        • bySatyajit Daulaguphu
        • February 27, 2019
        Attackers are constantly finding new ways to bypass security solutions to deliver malware or phish users. Earlier phishing…
        MMalware Analysis
        steps to install cuckoo sandbox
        Read More

          Install Cuckoo Sandbox For Real-Time Malware Analysis [Part 1]

          • bySatyajit Daulaguphu
          • December 22, 2018
          For the past couple of months, I thought of implementing an internal Sandbox (Cuckoo Sandbox) for my organization…
          TThreat Lab
          Linux malware mining crypto currency
          Read More

            New Linux Trojan Mines Cryptocurrency from Your Machine & Raspberry Pi and Turns It Into a Botnet

            • bySatyajit Daulaguphu
            • September 24, 2018
            Over the past few days, I have been noticing a new threat for Linux operating systems and It…
            TThreat Lab
            Microsoft Safelinks
            Read More

              Office 365’s ATP Security Feature Creating Havoc

              • bySatyajit Daulaguphu
              • April 20, 2018
              Hello readers! Today I will be writing a general post which I think can be helpful for the…

              Subscribe to Our Newsletter

              Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

              Tech Zealots
              © 2025. All Rights Reserved.
              • Privacy Policy
              • Cookies Policy
              • Write for Us