Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Browsing Tag

obfuscation techniques

1 post
MMalware Analysis
Javascript code obfuscation techniques
Read More

    JavaScript Code Obfuscation Techniques For Malware Delivery

    • bySatyajit Daulaguphu
    • April 1, 2018
    JavaScript code obfuscation techniques play a key role in delivering a malicious payload when an attackers want to target their users and they achieve this by hiding their code so that it could evade the detection of anti-virus software. JavaScript-based attacks have been reported as the top Internet security threats in recent years and have become ... Read more

    Subscribe to Our Newsletter

    Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

    Tech Zealots
    © 2023. All Rights Reserved.
    • Privacy Policy
    • Cookies Policy
    • Write for Us