Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Satyajit Daulaguphu

24 posts
Satyajit Daulaguphu is a Security Researcher at Trellix (Formerly FireEye). He focuses mainly on threat detection, malware research and rules creation.
TTech Bytes
API testing strategy for application security testing
Read More

    How Does API Testing Fit into an Overall Application Security Strategy?

    • bySatyajit Daulaguphu
    • September 3, 2025
    Key Takeaways Introduction to API Security In today’s hyper-connected world, the digital economy runs on data. Every mobile…
    TTech Bytes
    cybersecurity career trends and how to prepare for them
    Read More

      10 Powerful Cybersecurity Career Trends and How to Prepare for Them?

      • bySatyajit Daulaguphu
      • August 5, 2025
      In today’s hyper-coupled world, cybersecurity has become one of the most important and fastest-growing fields. Growing rapidly with…
      TThreat Lab
      Image describing exploitation and detection strategies of Sudo Chroot Privilege Escalation vulnerability, tracked as CVE-2025-32463.
      Read More

        CVE-2025-32463 Critical Sudo Chroot Exploit: Complete Detection & Remediation Guide

        • bySatyajit Daulaguphu
        • July 11, 2025
        On June 30, 2025, the team at Stratascale Cyber Research Unit (CRU) identified a local privilege escalation vulnerability…
        AAI Security
        Living off the AI attacks
        Read More

          Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)

          • bySatyajit Daulaguphu
          • June 24, 2025
          To understand LotL-AI (Living off the AI), one must first understand the term Living off the Land or…
          TThreat Lab
          code obfuscation techniques
          Read More

            Code Obfuscation: 10 Powerful Techniques for Maximum Security!

            • bySatyajit Daulaguphu
            • October 12, 2023
            What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
            MMalware Analysis
            DLL side loading technique leveraged by Qakbot to carry out its attack
            Read More

              How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

              • bySatyajit Daulaguphu
              • November 5, 2022
              QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…

              Subscribe to Our Newsletter

              Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

              Tech Zealots
              © 2023. All Rights Reserved.
              • Privacy Policy
              • Cookies Policy
              • Write for Us