AAI Security Read More Living off the AI: The New Cyber Threat Hiding in Plain Sight (2025 Guide)bySatyajit DaulaguphuJune 24, 2025 To understand LotL-AI (Living off the AI), one must first understand the term Living off the Land or…
TThreat Lab Read More Code Obfuscation: 10 Powerful Techniques for Maximum Security!bySatyajit DaulaguphuOctober 12, 2023 What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
MMalware Analysis Read More How QakBot Leverages DLL Side Loading Technique? – Technical AnalysisbySatyajit DaulaguphuNovember 5, 2022 QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
TTech Bytes Read More What Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
MMalware Analysis Read More Mastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…