{"id":14020,"date":"2021-07-21T18:21:47","date_gmt":"2021-07-21T18:21:47","guid":{"rendered":"https:\/\/kela.dev.8scope.net\/products\/radark\/"},"modified":"2023-04-03T14:11:59","modified_gmt":"2023-04-03T14:11:59","slug":"monitor","status":"publish","type":"page","link":"https:\/\/www.kelacyber.com\/ja\/platform\/monitor\/","title":{"rendered":"MONITOR"},"content":{"rendered":"<div  class=\"content-section-wrap  alignfull text-white bg-cover\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/radark-bg-04b.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                            <div class=\"section-title-container\">\n                                            <h1 class=\"section-title\">AUTOMATED &#038; TARGETED <br>THREAT INTELLIGENCE<span class=\"section-title-decoration\"><\/span><\/h1>\n                                                        <\/div>\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p><span style=\"font-weight: 400;\">KELA\u2019s Cybercrime Attack Surface Intelligence license delivers automated threat intelligence, cultivating the targeted and contextualized insights &#8211; at scale &#8211; that you need to stay ahead of attackers. Automatically monitor your environment and ensure that targeted threats are mitigated immediately to consistently maintain a strong security posture.<\/span><\/p>\n                                    <\/div>\n                                                                                                    <footer class=\"content-block-footer\">\n                                        <a href=\"\/product-demo\/\" title=\"Watch Demo\" class=\"btn btn-primary\" role=\"button\">Watch Demo<\/a>\n                                    <\/footer>\n                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 animation-element slide-right\">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n\n\n\n<div class=\"kela-carousel desktop-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"spinner\" class=\"holder\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_Discovery-1024x455.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_Discovery-1024x455.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_1-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_1-1024x463.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_VR-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_VR-1024x462.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav>\n\n\t\t\t\t<button class=\"nav prev\" onclick=\"galleryspin('-')\">Prev<\/button>\n\n\t\t\t\t<button class=\"nav next\" onclick=\"galleryspin('')\">Next<\/button>\n\n\t\t\t<\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<div class=\"kela-carousel mobile-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"product-slider\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_Discovery-1024x455.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_Discovery-1024x455.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_1-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_1-1024x463.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_VR-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/RADARK_VR-1024x462.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav class=\"slick-nav\"><\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n\r\n\r\n<div  class=\"content-section-wrap image-box image_box_style_1  alignfull  \" >\n            <div class=\"container\">\n        <section>\n            <div class=\"row\">\n                <div class=\"col-sm-12\">\n                                                        <\/div>\n            <\/div>\n                <div class=\"row  justify-content-start\">\n                                                                                <div class=\"content-block ib-1 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>TAILORED MONITORING AND ALERTING<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>Configure specific assets to track threats to your organization, your supply chain, your executives and your attack surface, so you\u2019re alerted only on threats that matter the most. Cybercrime Attack Surface Intelligence license arms organizations with intelligence that helps them focus security efforts on targeted information relevant specifically to them.<\/p>\n<div class=\"row\">\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12363\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-SECTOR-150x150.png\" alt=\"your sector icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-SECTOR-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-SECTOR-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-SECTOR.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Your Sector<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12361\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ORGANIZATION-150x150.png\" alt=\"your organization icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ORGANIZATION-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ORGANIZATION-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ORGANIZATION.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Your Organization<\/div>\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12359\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-EXECUTIVES-150x150.png\" alt=\"your executives icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-EXECUTIVES-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-EXECUTIVES-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-EXECUTIVES.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Your Executives<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12357\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ATTACK-SURFACE-150x150.png\" alt=\"attack surface icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ATTACK-SURFACE-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ATTACK-SURFACE-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/YOUR-ATTACK-SURFACE.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Your Attack Surface<\/div>\n<\/div>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                                                <div class=\"content-block ib-2 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>EXTENSIVE SOURCE COLLECTION<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>Cybercrime Attack Surface Intelligence license continuously collects intelligence from a variety of hard-to-reach sources, including cybercrime forums and markets, closed instant messaging channels, and other illicit hacking services. Each source is pre-qualified by KELA\u2019s intelligence experts to reduce noise and ensure that you\u2019re receiving real intelligence from reliable sources.<\/p>\n<div class=\"row\">\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12323\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-150x150.png\" alt=\"cybercrime forums icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Cybercrime Forums<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12347\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-MARKETS-150x150.png\" alt=\"cybercrime markets icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-MARKETS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-MARKETS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-MARKETS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Cybercrime Markets<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12353\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/PRIVATE-MESSAGING-150x150.png\" alt=\"private messaging icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PRIVATE-MESSAGING-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PRIVATE-MESSAGING-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/PRIVATE-MESSAGING.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Private Messaging<\/div>\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12355\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/TEXT-PASTE-DUMPS-150x150.png\" alt=\"text paste dumps icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/TEXT-PASTE-DUMPS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/TEXT-PASTE-DUMPS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/TEXT-PASTE-DUMPS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Text Paste Dumps<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12337\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-150x150.png\" alt=\"ransomware blog icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Ransomware Blogs<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12321\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-150x150.png\" alt=\"compromised database icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Compromised Databases<\/div>\n<\/div>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                        <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap image-box three  alignfull bg-cover constrain-icons section-curve-top curve-in \" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/Kela_lightbg_2.jpg);\">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 85.67\" class=\"top-curve curve-in\"><path class=\"cls-1\" d=\"M1920,7.15C1695.56,55,1349,85.67,960,85.67S224.44,55,0,7.15V0H1920Z\"\/><\/svg>\n        <div class=\"container\">\n        <section>\n                            <div class=\"row\">\n                    <div class=\"col-12 media-text-media\">\n                                                                    <\/div>\n                <\/div>\n                <div class=\"row  \">\n                    <div class=\"col-12 media-text-text\">\n                        <div class=\"row justify-content-start\">\n                                                                <div class=\"content-block fb fb-1 col-sm-12 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/network-4.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>NETWORK MAPPING &#038; RECONNAISSANCE<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>Cybercrime Attack Surface Intelligence license monitors an organization\u2019s attack surface, watching the perimeter and domains for exposed databases, open ports and other vulnerable technologies. Network defenders are instantly equipped with contextualized intelligence to understand each weakness in their network and better prioritize mitigation actions.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-2 col-sm-12 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/dashboard.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>MACHINE READABLE REPORTS<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>Cybercrime Attack Surface Intelligence license automatically generates machine-readable reports on intelligence such as leaked databases, exposed ports and hosts in your network, compromised accounts or stolen credit cards. Leverage the flexible Cybercrime Attack Surface Intelligence license API to enrich other key tools in your security infrastructure such as SOAR tools, Threat Intelligence Platforms, and SIEMs with targeted intelligence from the cybercrime underground.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-3 col-sm-12 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/goal.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>ACTIONABLE RESULTS<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>Intuitive and interactive dashboards deliver timely threat intelligence to help you make data-driven decisions. KELA eliminates redundant results, so that you can save time and focus your efforts on real threats before they cause harm.<\/p>\n<div class=\"row\">\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12327\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-150x150.png\" alt=\"hacking discussion icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Hacking Discusion<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12331\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png\" alt=\"instant messaging icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Instant Messaging<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12333\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-150x150.png\" alt=\"leaked credentials icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Leaked Credentials<\/div>\n<div class=\"col-md-5\"><img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12351\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/NETWORK-VULNERABILITIES-150x150.png\" alt=\"network vulnerabilities icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/NETWORK-VULNERABILITIES-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/NETWORK-VULNERABILITIES-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/NETWORK-VULNERABILITIES.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Network Vulnerabilities<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12319\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-150x150.png\" alt=\"compromised accounts icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Compromised Accounts<br \/>\n<img decoding=\"async\" class=\"alignnone product-icon size-thumbnail wp-image-12349\" style=\"margin-bottom: 10px;\" src=\"https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INTELLIGENCE-REPORTS-150x150.png\" alt=\"intelligence reports icon\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INTELLIGENCE-REPORTS-150x150.png 150w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INTELLIGENCE-REPORTS-300x300.png 300w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/INTELLIGENCE-REPORTS.png 512w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/> Intelligence Reports<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n                                                        <\/div>\n                                                                                                                                                                <footer class=\"content-block-footer\">\n                                                            <a href=\"\/product-demo\/\" title=\"Watch Demo\" class=\"btn btn-primary\" role=\"button\">Watch Demo<\/a>\n                                                        <\/footer>\n                                                                                                        <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                                    <\/div>\n                    <\/div>\n                <\/div>\n                                    <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-two  alignfull text-center text-white bg-img-width-100 pt-5 pb-5\" style=\"background-color: #000000; \">\n            <div class=\"container\">\n        <section class=\"callout-two-section-container\">\n            <div class=\"row\">\n                <div class=\"content-block col-sm-12\">\n                    <section>\n                        <div class=\"article-wrap\">\n                                                    <header>\n                                <h1>Looking to investigate these threats further?<\/h1>\n                            <\/header>\n                                                                            <p><span style=\"font-weight: 400;\">Read more about Cybercrime Investigations &#8211; KELA\u2019s robust and flexible technology for cybercrime intelligence investigations.<\/span><\/p>\n<a href=\"\/products\/darkbeast\/\" role=\"button\" class=\"btn btn-primary\"  title=\"\">Learn more<\/a>\n<div class=\"sm-divider-dark\"><\/div>\n                                                <\/div>\n                    <\/section>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap  alignfull bg-cover text-white bg-pos-middle section-curve-bottom curve-out\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/Background_w2.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                                    <h3>ILLUMINATE HIDDEN THREAT<\/h3>\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p>The cybercrime underground ecosystem is constantly mutating and evolving. Its most harmful operations are hidden in its darkest corners. KELA penetrates these hard-to-reach corners to automatically collect and analyze this information. KELA\u2019s data lake, the hub where all of this information is securely stored, is the source of all of our intelligence operations. Built with cybercriminal methodologies in mind, KELA\u2019s technologies make all of this information accessible in a number of ways. Based on our customers\u2019 organizational requirements, KELA\u2019s products are each designed with a unique purpose to ensure that most critical intelligence is available to them in the most scalable and accessible way possible.<\/p>\n                                    <\/div>\n                                                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 \">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 105.56\" class=\"bottom-curve\"><path class=\"cls-1\" d=\"M953.61,77C588.27,77,254.57,50.35,0,0V105.56H1920V1.25C1662.05,51.16,1322.89,77,953.61,77Z\"\/><\/svg>\n    <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-resources  alignfull section-title-center\" >\n            <div class=\"container\">\n        <section class=\"callout-resouces-text-section-container\">\n            <div class=\"row \">\n                <div class=\"content-block col-lg-12 col-md-12 callout-resources-text-content\">\n                    <article>\n                                                    <header class=\"about-two-heading\">\n                                                                    <h2 class=\"about-two-title mb-5\">Read more from KELA<\/h2>\n                                                            <\/header>\n                                                                                            <\/article>\n                <\/div>\n                <div class=\"col-md-12 col-lg-12\">\n                    <div class=\"row  uniform\">\n                                                                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\">Access-as-a-Service &#8211; Remote Access Markets in the Cybercrime Underground<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\">$1 Million is Just the Beginning: Q4 2020 in Network Access Sales<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                                                                                        <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":0,"parent":13920,"menu_order":17,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-product-single.php","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-14020","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"blogimg":false,"teamimg":false,"pressimg":false,"blogthumb":false,"bloghimg":false,"bloghvid":false,"bloginner":false,"blogrelated":false,"product-icon":false,"alm-thumbnail":false},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=14020"}],"version-history":[{"count":28,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14020\/revisions"}],"predecessor-version":[{"id":21102,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/14020\/revisions\/21102"}],"up":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13920"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=14020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}