NordVPN
Up to 77% Off NordVPN + 3 Extra Months
Get Deal
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Satyajit Daulaguphu

25 posts
Satyajit Daulaguphu is a Security Researcher at Trellix (Formerly FireEye). He focuses mainly on threat detection, malware research and rules creation.
SSecurity Tools & Reviews
Nord VPN review - the Threat Detection Engineer way
Read More

    NordVPN Through a Cybersecurity Lens: A Threat Detection Expert’s Comprehensive Analysis (2025)

    • bySatyajit Daulaguphu
    • October 28, 2025
    ⚠️ THREAT ALERT: Key 2025 Breach Statistics• $4.44 million - Global average cost of a breach• $10.22 million…
    TTech Bytes
    API testing strategy for application security testing
    Read More

      How Does API Testing Fit into an Overall Application Security Strategy?

      • bySatyajit Daulaguphu
      • September 3, 2025
      Key Takeaways Introduction to API Security In today’s hyper-connected world, the digital economy runs on data. Every mobile…
      TTech Bytes
      cybersecurity career trends and how to prepare for them
      Read More

        10 Powerful Cybersecurity Career Trends and How to Prepare for Them?

        • bySatyajit Daulaguphu
        • August 5, 2025
        In today’s hyper-coupled world, cybersecurity has become one of the most important and fastest-growing fields. Growing rapidly with…
        TThreat Lab
        Image describing exploitation and detection strategies of Sudo Chroot Privilege Escalation vulnerability, tracked as CVE-2025-32463.
        Read More

          CVE-2025-32463 Critical Sudo Chroot Exploit: Complete Detection & Remediation Guide

          • bySatyajit Daulaguphu
          • July 11, 2025
          On June 30, 2025, the team at Stratascale Cyber Research Unit (CRU) identified a local privilege escalation vulnerability…
          AAI Security
          Living off the AI attacks
          Read More

            Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)

            • bySatyajit Daulaguphu
            • June 24, 2025
            To understand LotL-AI (Living off the AI), one must first understand the term Living off the Land or…
            TThreat Lab
            code obfuscation techniques
            Read More

              Code Obfuscation: 10 Powerful Techniques for Maximum Security!

              • bySatyajit Daulaguphu
              • October 12, 2023
              What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…

              Subscribe to Our Newsletter

              Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

              Tech Zealots
              © 2025. All Rights Reserved.
              • Privacy Policy
              • Cookies Policy
              • Write for Us