HiSolutions<p>📢New in our Research-Blog: A Tale of Practical Keylogger Forensics</p><p>On a recent engagement, an interesting hardware side quest popped up.<br>A client had found a <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> and, naturally, Cass Rebellin and <span class="h-card" translate="no"><a href="https://infosec.exchange/@jrt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jrt</span></a></span> wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.<br>The full story 👉<a href="https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">07/a-tale-of-practical-keylogger-forensics/</span></a></p><p><a href="https://infosec.exchange/tags/ResearchBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ResearchBlog</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a></p>