NordVPN
Up to 77% Off NordVPN + 3 Extra Months
Get Deal
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Office 365 Spear Phishing attack
Read More
    TThreat Lab

    How Cyber Criminals Are Abusing Microsoft Domain to Deliver Phishing Mails

    • bySatyajit Daulaguphu
    • February 27, 2019
    Attackers are constantly finding new ways to bypass security solutions to deliver malware or phish users. Earlier phishing…
    steps to install cuckoo sandbox
    Read More
      MMalware Analysis

      Install Cuckoo Sandbox For Real-Time Malware Analysis [Part 1]

      • bySatyajit Daulaguphu
      • December 22, 2018
      For the past couple of months, I thought of implementing an internal Sandbox (Cuckoo Sandbox) for my organization…
      Linux malware mining crypto currency
      Read More
        TThreat Lab

        New Linux Trojan Mines Cryptocurrency from Your Machine & Raspberry Pi and Turns It Into a Botnet

        • bySatyajit Daulaguphu
        • September 24, 2018
        Over the past few days, I have been noticing a new threat for Linux operating systems and It…
        Microsoft Safelinks
        Read More
          TThreat Lab

          Office 365’s ATP Security Feature Creating Havoc

          • bySatyajit Daulaguphu
          • April 20, 2018
          Hello readers! Today I will be writing a general post which I think can be helpful for the…
          Javascript code obfuscation techniques
          Read More
            MMalware Analysis

            JavaScript Code Obfuscation Techniques For Malware Delivery

            • bySatyajit Daulaguphu
            • April 1, 2018
            JavaScript code obfuscation techniques play a key role in delivering a malicious payload when an attackers want to…
            Sigma Ransomware
            Read More
              TThreat Lab

              Malicious Word Document Spreading Sigma Ransomware

              • bySatyajit Daulaguphu
              • March 29, 2018
              Today I had a chance to investigate another SPAM email which we received in our queue and at…
              NordVPN logo
              SecurityScore:
              8.5 /10
              View Plans
              Get the Basic plan for $3.09 / month
              Links to NordVPN — I may earn a small commission (no extra cost to you).
              about
              About Me

              Satyajit Daulaguphu

              Satyajit brings over 8 years of expertise in Cyber Security to his role as a Threat Detection Engineer at Trellix, focusing on malware research, threat detection, and blog writing.

              Support Tech Zealots

              Subscribe to Our Newsletter

              Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

              Tech Zealots
              © 2025. All Rights Reserved.
              • Privacy Policy
              • Cookies Policy
              • Write for Us