Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Best Computer for Cyber Security
Read More
    TTech Bytes

    What Is the Best Computer for Cyber Security? 8 Options

    • bySatyajit Daulaguphu
    • August 23, 2022
    Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
    PE structure
    Read More
      MMalware Analysis

      Mastering PE Structure for Malware Analysis: A Layman’s Guide

      • bySatyajit Daulaguphu
      • August 15, 2022
      In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
      Malware Persistence mechanisms
      Read More
        MMalware Analysis

        11 Critical Malware Persistence Mechanisms You Should Be Familiar With!

        • bySatyajit Daulaguphu
        • April 7, 2022
        In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
        TThreat Lab

        So, Emotet’s Back Huh…

        • byPrerna Chaudhary
        • July 24, 2020
        So, Emotet’s back after a hiatus of around 5 months and, as per claims around the internet, delivered…
        Macro Enabled Doc
        Read More
          TThreat Lab

          How To Quickly Extract Malicious Macros From Maldoc & Triage Incident?

          • bySatyajit Daulaguphu
          • December 10, 2019
          Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an…
          Malware analysis of a WannaCry ransomware sample
          Read More
            TThreat Lab

            Dissecting WannaCry Ransomware to It’s Core – Technical Analysis

            • bySatyajit Daulaguphu
            • November 24, 2019
            Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample.…
            about
            About Me

            Satyajit Daulaguphu

            Satyajit brings over 8 years of expertise in Cyber Security to his role as a Threat Detection Engineer at Trellix, focusing on malware research, threat detection, and blog writing.

            Support Tech Zealots

            Subscribe to Our Newsletter

            Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

            Tech Zealots
            © 2023. All Rights Reserved.
            • Privacy Policy
            • Cookies Policy
            • Write for Us