{"id":14014,"date":"2021-07-21T17:30:01","date_gmt":"2021-07-21T17:30:01","guid":{"rendered":"https:\/\/kela.dev.8scope.net\/products\/darkbeast\/"},"modified":"2023-05-09T12:49:03","modified_gmt":"2023-05-09T12:49:03","slug":"investigate","status":"publish","type":"page","link":"https:\/\/www.kelacyber.com\/ja\/platform\/investigate\/","title":{"rendered":"INVESTIGATE"},"content":{"rendered":"<div  class=\"content-section-wrap  alignfull text-white bg-cover\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/darkbeast-header-v2a.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                            <div class=\"section-title-container\">\n                                            <h1 class=\"section-title\">ROBUST &#038; FLEXIBLE<br>CYBERCRIME INTELLIGENCE  INVESTIGATION<span class=\"section-title-decoration\"><\/span><\/h1>\n                                                        <\/div>\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p><span style=\"font-weight: 400;\">KELA&#8217;s Cybercrime Investigations license provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA\u2019s cybercrime data lake. Gain visibility into underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions.<\/span><\/p>\n                                    <\/div>\n                                                                                                    <footer class=\"content-block-footer\">\n                                        <a href=\"\/product-demo\/\" title=\"Watch Demo\" class=\"btn btn-primary\" role=\"button\">Watch Demo<\/a>\n                                    <\/footer>\n                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 animation-element slide-right\">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n\n\n\n<div class=\"kela-carousel desktop-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"spinner\" class=\"holder\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav>\n\n\t\t\t\t<button class=\"nav prev\" onclick=\"galleryspin('-')\">Prev<\/button>\n\n\t\t\t\t<button class=\"nav next\" onclick=\"galleryspin('')\">Next<\/button>\n\n\t\t\t<\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<div class=\"kela-carousel mobile-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"product-slider\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav class=\"slick-nav\"><\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n\r\n\r\n<div  class=\"content-section-wrap image-box image_box_style_1  alignfull  \" >\n            <div class=\"container\">\n        <section>\n            <div class=\"row\">\n                <div class=\"col-sm-12\">\n                                                        <\/div>\n            <\/div>\n                <div class=\"row  justify-content-start\">\n                                                                                <div class=\"content-block ib-1 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>REAL-TIME DATA COLLECTION<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>KELA&#8217;s Cybercrime Investigations license automatically and continuously collects information from hard-to-reach, dynamic sources in the cybercrime underground. Real-time information collection ensures that you are always investigating the most up-to-date data. All data is securely stored and made accessible for later reference.<\/p>\n<div class=\"row\">\n<div class=\"col-md-5\">\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12323\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-150x150.png\" alt=\"dark web forums icon\" width=\"50\" height=\"50\" style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/>\u00a0Cybercrime Forums<br \/>\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12329\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/ILLICIT-MARKETS-150x150.png\" alt=\"illicit markets icon\" width=\"50\" height=\"50\"  style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/ILLICIT-MARKETS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/ILLICIT-MARKETS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/ILLICIT-MARKETS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/>\u00a0Illicit Marks<br \/>\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12331\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png\" alt=\"instant messaging icon\" width=\"50\" height=\"50\" style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Instant Messaging\n    <\/div>\n<div class=\"col-md-5\">\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12335\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/PASTE-SITES-150x150.png\" alt=\"paste sites icon\" width=\"50\" height=\"50\" style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PASTE-SITES-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PASTE-SITES-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PASTE-SITES.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Paste Sites<br \/>\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12337\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-150x150.png\" alt=\"ransomware blog icon\" width=\"50\" height=\"50\"  style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Ransomware Blog<br \/>\n        <img decoding=\"async\" class=\"alignnone product-icon  wp-image-12321\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-150x150.png\" alt=\"compromised database icon\" width=\"50\" height=\"50\"  style=\"margin-bottom:10px;\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Compromised Database\n    <\/div>\n<\/div>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                                                <div class=\"content-block ib-2 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>IN-DEPTH RESEARCH CAPABILITIES<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>KELA&#8217;s Cybercrime Investigations license offers user-friendly search functionality with advanced features that empower you to easily research anything in the cybercrime underground. Uncovering the right data for your organization means you can quickly pivot to focus on specific threats, minimise the risk exposure of sensitive data, accelerate incident response and profile threat actors. The only limitation is your imagination.<\/p>\n<div class=\"row\">\n<div class=\"col-md-5\">\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-150x150.png\" alt=\"hacking discussion icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12327\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Hacking Discussions<br \/>\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png\" alt=\"instant messaging icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12331\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Instand Messaging<br \/>\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-150x150.png\" alt=\"leaked credentials icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12333\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Leaked Credentials\n    <\/div>\n<div class=\"col-md-5\">\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/BREACHED-SERVERS-150x150.png\" alt=\"breached server icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12315\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/BREACHED-SERVERS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/BREACHED-SERVERS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/BREACHED-SERVERS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Breached Servers<br \/>\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-150x150.png\" alt=\"compromised accounts icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12319\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Compromised Accounts<br \/>\n        <img decoding=\"async\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/FINISHED-INTELLIGENCE-150x150.png\" alt=\"finished intelligence icon\" style=\"margin-bottom: 10px\" width=\"50\" height=\"50\" class=\"alignnone product-icon size-thumbnail wp-image-12325\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/FINISHED-INTELLIGENCE-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/FINISHED-INTELLIGENCE-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/FINISHED-INTELLIGENCE.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Finished Intelligence\n    <\/div>\n<\/div>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                        <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap image-box three  alignfull bg-cover constrain-icons section-curve-top curve-in \" style=\"background-color: #efefef; \">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 85.67\" class=\"top-curve curve-in\"><path class=\"cls-1\" d=\"M1920,7.15C1695.56,55,1349,85.67,960,85.67S224.44,55,0,7.15V0H1920Z\"\/><\/svg>\n        <div class=\"container\">\n        <section>\n                            <div class=\"row\">\n                    <div class=\"col-12 media-text-media\">\n                                                                    <\/div>\n                <\/div>\n                <div class=\"row  \">\n                    <div class=\"col-12 media-text-text\">\n                        <div class=\"row justify-content-start\">\n                                                                <div class=\"content-block fb fb-1 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/face-2.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>UNIQUE IMAGE ANALYSIS FEATURES<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license collects text, images, and other metadata from the sources crawled, and uses a unique image analysis capability to allow users to extract critical intelligence from images. Images are instantly made searchable, ensuring that you will never miss threats hidden behind them.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-2 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/subscription-1.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>FEATURED QUERIES &#038; SUBSCRIPTIONS<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license allows you to deepen your investigation with pre-defined queries on the latest ransomware attacks, Initial Access Brokers, common vulnerabilities and exposures (CVEs) and other currently trending subjects. Continually be notified on these or any other topics that you want to keep up with, using pre-configured search queries and tailored alerts.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-3 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/thought-1.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>ACCESS TO FINISHED INTELLIGENCE<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>Finished Intelligence, available through KELA&#8217;s Cybercrime Investigations license, ensures that users gain full access to ongoing research and insights developed by KELA\u2019s Cyber Intelligence Center. Browse through KELA&#8217;s Cybercrime Investigations license&#8217;s Finished Intelligence Feed to gain insights from KELA\u2019s experts about recent ransomware events, network accesses, database leaks, and other cybercrime threats.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-4 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/account-2.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>COMPLETE ANONYMITY AND SAFETY<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license serves as an anonymous proxy so that you can search the cybercrime and other hidden sources without leaving a trace or attracting unwanted attention. Safely access and analyze information stored in the cybercrime underground without breaking any existing security policies.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                                    <\/div>\n                    <\/div>\n                <\/div>\n                                    <div class=\"row\">\n                        <div class=\"col-12\">\n                            <div class=\"section-footer-content\">\n                                <p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"\/product-demo\/\" role=\"button\" class=\"btn btn-primary\"  title=\"\">Watch Demo<\/a><\/p>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-two  alignfull text-center text-white\" style=\"background-color: #000000; \">\n            <div class=\"container\">\n        <section class=\"callout-two-section-container\">\n            <div class=\"row\">\n                <div class=\"content-block col-sm-12\">\n                    <section>\n                        <div class=\"article-wrap\">\n                                                    <header>\n                                <h1>Looking to automatically identify threats that are specifically targeting your organizations?<\/h1>\n                            <\/header>\n                                                                            <p class=\"lead\">Read more about Cybercrime Attack Surface Intelligence license &#8211; KELA\u2019s automated and targeted threat intelligence technology.<\/p>\n<a href=\"\/products\/radark\/\" role=\"button\" class=\"btn btn-primary\"  title=\"\">Learn more<\/a>\n<div class=\"sm-divider-dark\"><\/div>\n                                                <\/div>\n                    <\/section>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap  alignfull bg-cover text-white bg-pos-middle section-curve-bottom curve-out\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/Background_w2.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                                    <h3>ILLUMINATE HIDDEN THREATS<\/h3>\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p>The cybercrime underground ecosystem is constantly mutating and evolving. Its most harmful operations are hidden in its darkest corners. KELA penetrates these hard-to-reach corners to automatically collect and analyze this information. KELA\u2019s data lake, the hub where all of this information is securely stored, is the source of all of our intelligence operations. Built with cybercriminal methodologies in mind, KELA\u2019s technologies make all of this information accessible in a number of ways. Based on our customers\u2019 organizational requirements, KELA\u2019s products are each designed with a unique purpose to ensure that most critical intelligence is available to them in the most scalable and accessible way possible.<\/p>\n                                    <\/div>\n                                                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 \">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 105.56\" class=\"bottom-curve\"><path class=\"cls-1\" d=\"M953.61,77C588.27,77,254.57,50.35,0,0V105.56H1920V1.25C1662.05,51.16,1322.89,77,953.61,77Z\"\/><\/svg>\n    <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-resources  alignfull section-title-center\" >\n            <div class=\"container\">\n        <section class=\"callout-resouces-text-section-container\">\n            <div class=\"row \">\n                <div class=\"content-block col-lg-12 col-md-12 callout-resources-text-content\">\n                    <article>\n                                                    <header class=\"about-two-heading\">\n                                                                    <h2 class=\"about-two-title mb-5\">Read more from KELA<\/h2>\n                                                            <\/header>\n                                                                                            <\/article>\n                <\/div>\n                <div class=\"col-md-12 col-lg-12\">\n                    <div class=\"row  uniform\">\n                                                                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\">Access-as-a-Service &#8211; Remote Access Markets in the Cybercrime Underground<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\">$1 Million is Just the Beginning: Q4 2020 in Network Access Sales<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                                                                                        <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":0,"parent":13920,"menu_order":18,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-product-single.php","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-14014","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"blogimg":false,"teamimg":false,"pressimg":false,"blogthumb":false,"bloghimg":false,"bloghvid":false,"bloginner":false,"blogrelated":false,"product-icon":false,"alm-thumbnail":false},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=14014"}],"version-history":[{"count":33,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14014\/revisions"}],"predecessor-version":[{"id":21523,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14014\/revisions\/21523"}],"up":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13920"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=14014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}