News
The security log is now full (Event ID 1104) is logged every time Windows security log fills up. This post describes the necessary actions to take.
You can disable single or all Windows Event Logs via the Event Viewer, Service Manager, Command Prompt, Registry, or System Configuration. Here's more about it.
Hackers are now hiding malware in Windows Event Logs Security researchers have noticed a malicious campaign that used Windows event logs to store malware, a technique that has not been previously ...
I'm writing a Windows app in unmanaged C++ and want to log some simple events to the Application log. I'm normally a *nix guy and am used to being able to just call syslog() (or asl(3) on Mac OS X ...
Free unofficial patches are available for a new Windows zero-day vulnerability dubbed 'EventLogCrasher' that lets attackers remotely crash the Event Log service on devices within the same Windows ...
The log-on/log-off category of the Windows security log gives you the ability to monitor all attempts to access the local computer. This article examines each log-on type and shows how some other ...
The technique involves injecting shellcode directly into Windows event logs. This allows adversaries to use the Windows event logs as a cover for malicious late stage trojans, according to a ...
The Windows Event Log is typically used to record system events, network traffic, and related data such as security, performance, etc. You can take advantage of the Windows Event Log as a log ...
According to security researchers at Kaspersky, a customer showed this new behavior. The method injects shellcode payloads into the event logs for Windows' Key Management Services (KMS).
In brief: The Windows event log and Event Viewer are supposed to help users diagnose security issues and other problems in PCs. However, Kaspersky researchers encountered one hacker who used the ...
Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.
SIEM and SOAR allow enterprises to collect and correlate log event data but may not be the ideal choice for every organization. Microsoft’s Windows Event Forwarding aggregates system event logs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results