@wyatt @hatzka If I had to guess, these fundamental changes have happened since the XFree86 era:

1. Internationalization: Personal computer use has expanded out of the Americas and western Europe. Asia in particular brings a need for large glyph sets, contextual glyph shaping, diacritic stacking, bidirectional writing, top-to-bottom writing, and antialiasing to make small curves easier to distinguish. How well does X11's font paradigm handle these, as opposed to relying on "modern" toolkits to shove bitmaps around?

2. High density: People expect things to appear the same size on more than one display connected to one computer even if one has more pixels per millimeter than the other.

3. Privacy: Computer networks have become much less trusted over the past few decades. There was demand to deter publishers of proprietary applications from surreptitiously activating a keylogger or screen logger to exfiltrate your data in other applications.

#x11 #i18n #bidi #HighDPI #keylogger

A laughing RAT: CrystalX combines spyware; stealer; and prankware features

In March 2026, a new MaaS active campaign was discovered promoting previously unknown malware in private Telegram chats. The Trojan features an extensive arsenal of capabilities. On the panel provided to third‑party actors, in addition to the standard features of RAT‑like malware, a stealer, keylogger, clipper, and spyware are also available.

Pulse ID: 69ccba2f8538ade72d6e71e6
Pulse Link: https://otx.alienvault.com/pulse/69ccba2f8538ade72d6e71e6
Pulse Author: AlienVault
Created: 2026-04-01 06:24:47

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #KeyLogger #MaaS #Malware #OTX #OpenThreatExchange #RAT #SpyWare #Telegram #Trojan #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

BRUSHWORM and BRUSHLOGGER uncovered

A South Asian financial institution was targeted with two custom malware components: BRUSHWORM, a modular backdoor, and BRUSHLOGGER, a keylogger. BRUSHWORM features anti-analysis checks, encrypted configuration, scheduled task persistence, modular payload downloading, USB worm propagation, and extensive file theft. BRUSHLOGGER uses DLL side-loading to capture system-wide keystrokes with window context tracking. The malware's low sophistication and implementation flaws suggest an inexperienced author, possibly using AI code-generation tools. Multiple testing versions were discovered on VirusTotal, indicating iterative development. The malware components combine to create a functional collection platform with modular loading, USB propagation, broad file theft, air-gap bridging, and persistent keystroke capture.

Pulse ID: 69c643be1c9656febe1f3cc6
Pulse Link: https://otx.alienvault.com/pulse/69c643be1c9656febe1f3cc6
Pulse Author: AlienVault
Created: 2026-03-27 08:45:50

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AWS #Asia #BackDoor #CyberSecurity #InfoSec #KeyLogger #Malware #OTX #OpenThreatExchange #RAT #Rust #SouthAsia #USB #VirusTotal #Worm #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Dive into a hands-on tutorial: create a keylogger in Python for Windows with Tim's step-by-step guide using pynput. Great for learning input handling and security—use responsibly for research and defense! Hands-on coding & file logging explained. #Python #pynput #Keylogger #Windows #Cybersecurity #Programming #EthicalHacking #English
https://peertube.klemtu.ca/videos/watch/6513c89a-f186-4f60-9943-d2c3fe964c91
Create a Keylogger with Python - Tutorial

PeerTube

MAAS VIP_Keylogger Campaign

Pulse ID: 69bb25d47c4b05ffd0337a9a
Pulse Link: https://otx.alienvault.com/pulse/69bb25d47c4b05ffd0337a9a
Pulse Author: Tr1sa111
Created: 2026-03-18 22:23:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #KeyLogger #MaaS #OTX #OpenThreatExchange #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

MAAS VIP_Keylogger Campaign

A sophisticated keylogger campaign has been discovered, utilizing spear-phishing emails with attachments containing hidden malware. The campaign targets multiple countries, employing various packaging styles and execution methods. The malware, known as VIP_Keylogger, is delivered using steganography and process hollowing techniques. It focuses on stealing sensitive information from browsers, email clients, and other applications. The keylogger captures browser data, decrypts passwords, and exfiltrates information through multiple channels, including email. While some features appear disabled, the malware demonstrates advanced capabilities in data theft and evasion techniques.

Pulse ID: 69b7e0b1a4e3419dfc024013
Pulse Link: https://otx.alienvault.com/pulse/69b7e0b1a4e3419dfc024013
Pulse Author: AlienVault
Created: 2026-03-16 10:51:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #DataTheft #Email #InfoSec #KeyLogger #MaaS #Malware #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #SpearPhishing #Steganography #Word #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
@Andromxda ich würde es nicht ausschließen, dass einige Instanzen im einem virtualisierten Linux auf einem Microsoft/Apple-System oder in einer US-Cloud laufen. Man kann sich drehen wie man will und stets ein „ja aber“ anhängen - es ist jedoch keine digitale Souveränität, wenn US-Datenkraken direkten oder indirekten Zugriff haben. Die Kette ist nur so stark, wie das schwächste Glied. An #snowden s Worte , #Cloudact , #Keylogger & #Prism kann man nicht oft genug erinnern.
Talking about geolocation evidence in a datacenter, and having humans carry the Evidence from outside (where you can see satellites)... and I was thinking about people picking up random USB keys outside the smoking door. So vapes are USB rechargeable... I wonder about hidding a keylogger in a USB rechargeable vape. #vape #keylogger
Der Praxisteil meines „Hacking- und Pentest-Hardware-Workshops” umfasst fünf Stationen. In Kleingruppen von maximal drei Personen arbeiten die Teilnehmenden etwa eine Stunde lang die Aufgaben durch. In dieser Zeit gehe ich von Station zu Station und gebe Tipps sowie zusätzliche Informationen. Bei der ersten Station „Gadgets & Logger” dreht sich alles um Spionagegadgets, Keylogger und Screenlogger.
➡️ Klicken Sie hier, um mehr über die Workshop-Inhalte zu erfahren: https://scheible.it/workshop
#ITSicherheit #CyberAwareness #Seminar #SecurityKnowHow #Keylogger