Skip to content
New Report:
/ Unveiling Black Basta’s Use of PhaaS Platforms
Get Report
Use Cases
Cybercrime Threat Intelligence
Fraud Detection
Law Enforcement
Vulnerability Intelligence
Third-Party Intelligence
Brand Protection
Attack Surface Visibility
Platform
BRAND CONTROL
DIGITAL CTI ANALYSTS
IDENTITY GUARD
INVESTIGATE
MONITOR
TECHNICAL INTELLIGENCE
THREAT ACTORS
THREAT LANDSCAPE
TPRM
AiFort
KELA Partner Program
KELA Partners
Partner Program
Partner Login
Technology Partners
Resources
KELA Research
Documents
Webinars
Blog
Future of Cybercrime Podcast
KELA Cyber Pulse
Success Stories
Company
About
KELA in Press
Careers
EN
日本語
×
Use Cases
Cybercrime Threat Intelligence
Fraud Detection
Law Enforcement
Vulnerability Intelligence
Third-Party Intelligence
Brand Protection
Attack Surface Visibility
Platform
BRAND CONTROL
DIGITAL CTI ANALYSTS
IDENTITY GUARD
INVESTIGATE
MONITOR
TECHNICAL INTELLIGENCE
THREAT ACTORS
THREAT LANDSCAPE
TPRM
AiFort
KELA Partner Program
KELA Partners
Partner Program
Partner Login
Technology Partners
Resources
KELA Research
Documents
Webinars
Blog
Future of Cybercrime Podcast
KELA Cyber Pulse
Success Stories
Company
About
KELA in Press
Careers
EN
日本語
Cyber Intelligence Hub
Reduce your cyber risk and enhance your security posture with our expert resources. We provide the intelligence and strategies you need to protect your organization from evolving cyber threats.
All
CTI
Threat Actor Spotlight
Dark Web
More
Dark Web
June 10, 2025
Report: How Black Basta Tapped into the PhaaS Market
KELA’s newly released threat intelligence report, Unveiling Black Basta's Use of PhaaS Platforms, reveals how even sophisticated groups like Black Basta, known for crippling global enterprises, are ou
Dark Web
May 15, 2025
Darknet Markets Explained: Navigating the Hidden Web
Learn how darknet markets function and the challenges they present to cybersecurity, shedding light on the hidden side of the internet.