Read More TThreat LabHow Cyber Criminals Are Abusing Microsoft Domain to Deliver Phishing MailsbySatyajit DaulaguphuFebruary 27, 2019 Attackers are constantly finding new ways to bypass security solutions to deliver malware or phish users. Earlier phishing…
Read More MMalware AnalysisInstall Cuckoo Sandbox For Real-Time Malware Analysis [Part 1]bySatyajit DaulaguphuDecember 22, 2018 For the past couple of months, I thought of implementing an internal Sandbox (Cuckoo Sandbox) for my organization…
Read More TThreat LabNew Linux Trojan Mines Cryptocurrency from Your Machine & Raspberry Pi and Turns It Into a BotnetbySatyajit DaulaguphuSeptember 24, 2018 Over the past few days, I have been noticing a new threat for Linux operating systems and It…
Read More TThreat LabOffice 365’s ATP Security Feature Creating HavocbySatyajit DaulaguphuApril 20, 2018 Hello readers! Today I will be writing a general post which I think can be helpful for the…
Read More MMalware AnalysisJavaScript Code Obfuscation Techniques For Malware DeliverybySatyajit DaulaguphuApril 1, 2018 JavaScript code obfuscation techniques play a key role in delivering a malicious payload when an attackers want to…
Read More TThreat LabMalicious Word Document Spreading Sigma RansomwarebySatyajit DaulaguphuMarch 29, 2018 Today I had a chance to investigate another SPAM email which we received in our queue and at…