MMalware Analysis Read More How QakBot Leverages DLL Side Loading Technique? – Technical AnalysisbySatyajit DaulaguphuNovember 5, 2022 QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
TTech Bytes Read More What Is the Best Computer for Cyber Security? 8 OptionsbySatyajit DaulaguphuAugust 23, 2022 Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
MMalware Analysis Read More Mastering PE Structure for Malware Analysis: A Layman’s GuidebySatyajit DaulaguphuAugust 15, 2022 In this article, we will look at the PE Structure or Portable Executable file format (PE File Format),…
MMalware Analysis Read More 11 Critical Malware Persistence Mechanisms You Should Be Familiar With!bySatyajit DaulaguphuApril 7, 2022 In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…
TThreat Lab Read More How To Quickly Extract Malicious Macros From Maldoc & Triage Incident?bySatyajit DaulaguphuDecember 10, 2019 Ever received a Security Incident where a user machine got infected by a malicious attachment? And as an…
TThreat Lab Read More Dissecting WannaCry Ransomware to It’s Core – Technical AnalysisbySatyajit DaulaguphuNovember 24, 2019 Hi readers! This will probably be my first technical post regarding the deep analysis of any malware sample.…