Read More TTech BytesWhat Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
Read More MMalware AnalysisMastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
Read More MMalware Analysis11 Critical Malware Persistence Mechanisms You Should Be Familiar With!bySatyajit DaulaguphuApril 7, 2022 In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
TThreat LabSo, Emotet’s Back Huh…byPrerna ChaudharyJuly 24, 2020 So, Emotet’s back after a hiatus of around 5 months and, as per claims around the internet, delivered…
Read More TThreat LabHow To Quickly Extract Malicious Macros From Maldoc & Triage Incident?bySatyajit DaulaguphuDecember 10, 2019 Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an…
Read More TThreat LabDissecting WannaCry Ransomware to It’s Core – Technical AnalysisbySatyajit DaulaguphuNovember 24, 2019 Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample.…