The log-on/log-off category of the Windows security log gives you the ability to monitor all attempts to access the local computer. In this article I’ll examine each log-on type in greater detail and ...
Finding ransomware traces in Event Logs The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs. These logs often ...
Last summer's CrowdStrike meltdown caused billions of dollars in damage and exposed some fundamental architectural flaws in the Windows platform. A single flawed update from one vendor was enough to ...
Update, March 31, 2025: This story, originally published March 29, has been updated with an explanation of LOLBINS as well as further technical information regarding the Windows Defender Application ...
ClickFix attack employs fake Windows security udpates. Updated November 27 with another Windows update warning, along with threat intelligence from the Acronis Threat Research Unit regarding the use ...
Microsoft has patched 112 vulnerabilities in January 2026, including CVE-2026-20805, a Desktop Window Manager zero-day that ...
On October 14th, Microsoft will be officially ending support for Windows 10. However, if you aren't ready to upgrade yet, you can sign up for Extended Security Updates so you can continue getting ...