A
keylogger records keystrokes to steal credentials, PINs, and sensitive data. Types: software keyloggers (malware) and hardware keyloggers (physical USB/keyboard devices).
Software keyloggers are detected by EDR. Hardware keyloggers require physical access to install and remove. Physical inspection of keyboard connections detects hardware keyloggers. Multi-factor auth limits keylogger damage.