Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Satyajit Daulaguphu

21 posts
Satyajit Daulaguphu is a Security Researcher at Trellix (Formerly FireEye). He focuses mainly on threat detection, malware research and rules creation.
AAI Security
Living off the AI attacks
Read More

    Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)

    • bySatyajit Daulaguphu
    • June 24, 2025
    To understand LotL-AI (Living off the AI), one must first understand the term Living off the Land or…
    TThreat Lab
    code obfuscation techniques
    Read More

      Code Obfuscation: 10 Powerful Techniques for Maximum Security!

      • bySatyajit Daulaguphu
      • October 12, 2023
      What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
      MMalware Analysis
      DLL side loading technique leveraged by Qakbot to carry out its attack
      Read More

        How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

        • bySatyajit Daulaguphu
        • November 5, 2022
        QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
        TTech Bytes
        Best Computer for Cyber Security
        Read More

          What Is the Best Computer for Cyber Security? 8 Options

          • bySatyajit Daulaguphu
          • August 23, 2022
          Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
          MMalware Analysis
          PE structure
          Read More

            Mastering PE Structure for Malware Analysis: A Layman’s Guide

            • bySatyajit Daulaguphu
            • August 15, 2022
            In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…

            Subscribe to Our Newsletter

            Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

            Tech Zealots
            © 2023. All Rights Reserved.
            • Privacy Policy
            • Cookies Policy
            • Write for Us