TTech Bytes Read More What Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
MMalware Analysis Read More Mastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
MMalware Analysis Read More 11 Critical Malware Persistence Mechanisms You Should Be Familiar With!bySatyajit DaulaguphuApril 7, 2022 In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
TThreat Lab Read More How To Quickly Extract Malicious Macros From Maldoc & Triage Incident?bySatyajit DaulaguphuDecember 10, 2019 Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an…
TThreat Lab Read More Dissecting WannaCry Ransomware to It’s Core – Technical AnalysisbySatyajit DaulaguphuNovember 24, 2019 Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample.…
MMalware Analysis Read More Understanding Concepts of Virtual Address (VA), Relative Virtual Address (RVA) and File OffsetsbySatyajit DaulaguphuOctober 24, 2019 Before we proceed to the concept of PE File Format, which describes the internal structure of all Windows…