Estimated reading time: 5 minutesOverview: In our rapidly advancing technological landscape, cyber threat actors have grown increasingly sophisticated, employing intricate attack chains and malicious applications. They meticulously plan and execute well-defined, strategic attacks that unfold in stages. A typical malware attack comprises various...
About Shrutirupa Banerjiee
I am Shrutirupa, currently working as Senior Security Researcher at SEQRITE LABs. With nearly 5 years of experience, I have transitioned my focus from blockchain research to VAPT, WAF Research, and am now exploring malware research. I have a passion for playing CTFs and solving challenges based on Reverse Engineering.