{"id":21127,"date":"2023-03-15T11:00:37","date_gmt":"2023-03-15T11:00:37","guid":{"rendered":"https:\/\/kelacyber.com\/products\/threat-landscape\/"},"modified":"2023-05-09T12:51:24","modified_gmt":"2023-05-09T12:51:24","slug":"threat-landscape","status":"publish","type":"page","link":"https:\/\/www.kelacyber.com\/ja\/platform\/threat-landscape\/","title":{"rendered":"THREAT LANDSCAPE"},"content":{"rendered":"<div  class=\"content-section-wrap  alignfull text-white bg-cover\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/10\/darkbeast-header-v2a.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                            <div class=\"section-title-container\">\n                                            <h1 class=\"section-title\">ROBUST u0026amp; FLEXIBLEu003cbru003eCYBERCRIME INTELLIGENCE  INVESTIGATIONu003cspan class=u0022section-title-decorationu0022u003eu003c\/spanu003e<\/h1>\n                                                        <\/div>\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p>u003cspan style=u0022font-weight: 400u0022u003eKELA&#8217;s Cybercrime Investigations license provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA\u2019s cybercrime data lake. Gain visibility into underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions.u003c\/spanu003e<\/p>\n                                    <\/div>\n                                                                                                    <footer class=\"content-block-footer\">\n                                        <a href=\"\/product-demo\/\" title=\"Watch Demo\" class=\"btn btn-primary\" role=\"button\">Watch Demo<\/a>\n                                    <\/footer>\n                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 animation-element slide-right\">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n\n\n\n<div class=\"kela-carousel desktop-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"spinner\" class=\"holder\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav>\n\n\t\t\t\t<button class=\"nav prev\" onclick=\"galleryspin('-')\">Prev<\/button>\n\n\t\t\t\t<button class=\"nav next\" onclick=\"galleryspin('')\">Next<\/button>\n\n\t\t\t<\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<div class=\"kela-carousel mobile-only\">\n\n\t<div class=\"kela-carousel-inner-wrapper\">\n\n\t\t<div id=\"carousel\" class=\"kela-carousel-container\">\n\n\t\t\t<figure id=\"product-slider\">\n\n\t\t\t\t<figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_4-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_1-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_2-1024x462.png\" alt=\"\"><\/figure><figure class=\"image-container\"><img decoding=\"async\" data-fancybox=\"gallery\" data-src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\"  src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/DARKBEAST_3-1024x463.png\" alt=\"\"><\/figure>\n\t\t\t<\/figure>\n\n\t\t\t<nav class=\"slick-nav\"><\/nav>\n\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n\r\n\r\n<div  class=\"content-section-wrap image-box image_box_style_1  alignfull  \" >\n            <div class=\"container\">\n        <section>\n            <div class=\"row\">\n                <div class=\"col-sm-12\">\n                                                        <\/div>\n            <\/div>\n                <div class=\"row  justify-content-start\">\n                                                                                <div class=\"content-block ib-1 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>REAL-TIME DATA COLLECTION<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>KELA&#8217;s Cybercrime Investigations license automatically and continuously collects information from hard-to-reach, dynamic sources in the cybercrime underground. Real-time information collection ensures that you are always investigating the most up-to-date data. All data is securely stored and made accessible for later reference.<\/p>\n<p>u003cdiv class=u0022rowu0022u003e<br \/>    u003cdiv class=u0022col-md-5u0022u003e<br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12323u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/DARK-WEB-FORUMS-150&#215;150.pngu0022 alt=u0022dark web forums iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e\u00a0Cybercrime Forums <br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12329u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/ILLICIT-MARKETS-150&#215;150.pngu0022 alt=u0022illicit markets iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e\u00a0Illicit Marks<br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12331u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150&#215;150.pngu0022 alt=u0022instant messaging iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e Instant Messaging<br \/>    u003c\/divu003e<br \/>    u003cdiv class=u0022col-md-5u0022u003e<br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12335u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/PASTE-SITES-150&#215;150.pngu0022 alt=u0022paste sites iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e Paste Sites<br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12337u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/RANSOMWARE-BLOGS-150&#215;150.pngu0022 alt=u0022ransomware blog iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e Ransomware Blog<br \/>        u003cimg class=u0022alignnone product-icon  wp-image-12321u0022 src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-DATABASES-150&#215;150.pngu0022 alt=u0022compromised database iconu0022 width=u002250u0022 height=u002250u0022 style=u0022margin-bottom:10pxu0022 \/u003e Compromised Database<br \/>    u003c\/divu003e<br \/>u003c\/divu003e<\/p>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                                                <div class=\"content-block ib-2 col-md-12 \">\n                                    <section>                                        <div class=\"article-wrap\">\n                                                                                        <header class=\"content-block-header test\">\n                                                                                                                                                                                                                            <h2>IN-DEPTH RESEARCH CAPABILITIES<\/h2>\n                                                                                                                                                    <\/header>\n                                                                                    <div class=\"content-block-content\">\n                                                <p>KELA&#8217;s Cybercrime Investigations license offers user-friendly search functionality with advanced features that empower you to easily research anything in the cybercrime underground. Uncovering the right data for your organization means you can quickly pivot to focus on specific threats, minimise the risk exposure of sensitive data, accelerate incident response and profile threat actors. The only limitation is your imagination.<\/p>\n<p>u003cdiv class=u0022rowu0022u003e<br \/>    u003cdiv class=u0022col-md-5u0022u003e<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/HACKING-DISCUSSION-150&#215;150.pngu0022 alt=u0022hacking discussion iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12327u0022 \/u003e Hacking Discussions<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/INSTANT-MESSAGING-150&#215;150.pngu0022 alt=u0022instant messaging iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12331u0022 \/u003e Instand Messaging<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/LEAKED-CREDENTIALS-150&#215;150.pngu0022 alt=u0022leaked credentials iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12333u0022 \/u003e Leaked Credentials<br \/>    u003c\/divu003e<br \/>    u003cdiv class=u0022col-md-5u0022u003e<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/BREACHED-SERVERS-150&#215;150.pngu0022 alt=u0022breached server iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12315u0022 \/u003e Breached Servers<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/COMPROMISED-ACCOUNTS-150&#215;150.pngu0022 alt=u0022compromised accounts iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12319u0022 \/u003e Compromised Accounts<br \/>        u003cimg src=u0022https:\/\/kelacyber.com\/wp-content\/uploads\/2021\/10\/FINISHED-INTELLIGENCE-150&#215;150.pngu0022 alt=u0022finished intelligence iconu0022 style=u0022margin-bottom: 10pxu0022 width=u002250u0022 height=u002250u0022 class=u0022alignnone product-icon size-thumbnail wp-image-12325u0022 \/u003e Finished Intelligence<br \/>    u003c\/divu003e<br \/>u003c\/divu003e<\/p>\n                                            <\/div>\n                                                                                                                                                                <\/div>\n                                    <\/section>\n                                <\/div>\n                                                                                        <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap image-box three  alignfull bg-cover constrain-icons section-curve-top curve-in \" style=\"background-color: #efefef; \">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 85.67\" class=\"top-curve curve-in\"><path class=\"cls-1\" d=\"M1920,7.15C1695.56,55,1349,85.67,960,85.67S224.44,55,0,7.15V0H1920Z\"\/><\/svg>\n        <div class=\"container\">\n        <section>\n                            <div class=\"row\">\n                    <div class=\"col-12 media-text-media\">\n                                                                    <\/div>\n                <\/div>\n                <div class=\"row  \">\n                    <div class=\"col-12 media-text-text\">\n                        <div class=\"row justify-content-start\">\n                                                                <div class=\"content-block fb fb-1 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/face-2.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>UNIQUE IMAGE ANALYSIS FEATURES<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license collects text, images, and other metadata from the sources crawled, and uses a unique image analysis capability to allow users to extract critical intelligence from images. Images are instantly made searchable, ensuring that you will never miss threats hidden behind them.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-2 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/subscription-1.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>FEATURED QUERIES u0026amp; SUBSCRIPTIONS<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license allows you to deepen your investigation with pre-defined queries on the latest ransomware attacks, Initial Access Brokers, common vulnerabilities and exposures (CVEs) and other currently trending subjects. Continually be notified on these or any other topics that you want to keep up with, using pre-configured search queries and tailored alerts.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-3 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/thought-1.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>ACCESS TO FINISHED INTELLIGENCE<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>Finished Intelligence, available through KELA&#8217;s Cybercrime Investigations license, ensures that users gain full access to ongoing research and insights developed by KELA\u2019s Cyber Intelligence Center. Browse through KELA&#8217;s Cybercrime Investigations license&#8217;s Finished Intelligence Feed to gain insights from KELA\u2019s experts about recent ransomware events, network accesses, database leaks, and other cybercrime threats.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                    <div class=\"content-block fb fb-4 col-sm-6 animation-element slide-up\">\n                                        <section>\n                                            <div class=\"article-wrap\">\n                                                                                                <div class=\"row\">\n                                                    <div class=\"col-2\">\n                                                                                                                    <div class=\"block-image-container k1\">\n                                                                                                                                <img decoding=\"async\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/09\/account-2.png\" alt=\"\" class=\"img-fluid\">\n                                                            <\/div>\n                                                                                                            <\/div>\n                                                    <div class=\"col-10\">\n                                                        <header class=\"content-block-header\">\n                                                                                                                            <h2>COMPLETE ANONYMITY AND SAFETY<\/h2>\n                                                                                                                    <\/header>\n                                                                                                                <div class=\"content-block-content\">\n                                                            <p>KELA&#8217;s Cybercrime Investigations license serves as an anonymous proxy so that you can search the cybercrime and other hidden sources without leaving a trace or attracting unwanted attention. Safely access and analyze information stored in the cybercrime underground without breaking any existing security policies.<\/p>\n                                                        <\/div>\n                                                                                                                                                            <\/div>\n                                                <\/div>\n                                                                                            <\/div>\n                                        <\/section>\n                                    <\/div>\n                                                                                    <\/div>\n                    <\/div>\n                <\/div>\n                                    <div class=\"row\">\n                        <div class=\"col-12\">\n                            <div class=\"section-footer-content\">\n                                <p>u0026nbsp;<br \/>u003cp style=u0022text-align: centeru0022u003e<a href=\"u0022\/product-demo\/u0022\" role=\"button\" class=\"btn btn-primary\"  title=\"\">u0022Watch<\/a>u003c\/pu003e<\/p>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-two  alignfull text-center text-white\" style=\"background-color: #000000; \">\n            <div class=\"container\">\n        <section class=\"callout-two-section-container\">\n            <div class=\"row\">\n                <div class=\"content-block col-sm-12\">\n                    <section>\n                        <div class=\"article-wrap\">\n                                                    <header>\n                                <h1>Looking to automatically identify threats that are specifically targeting your organizations?<\/h1>\n                            <\/header>\n                                                                            <p>u003cp class=u0022leadu0022u003eRead more about Cybercrime Attack Surface Intelligence license &#8211; KELA\u2019s automated and targeted threat intelligence technology.u003c\/pu003e<br \/><a href=\"u0022\/products\/radark\/u0022\" role=\"button\" class=\"btn btn-primary\"  title=\"\">u0022Learn<\/a><br \/>u003cdiv class=u0022sm-divider-darku0022u003eu003c\/divu003e<\/p>\n                                                <\/div>\n                    <\/section>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>\n\r\n\r\n<div  class=\"content-section-wrap  alignfull bg-cover text-white bg-pos-middle section-curve-bottom curve-out\" style=\"background-image: url(https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/12\/Background_w2.jpg);\">\n            <div class=\"container\">\n        <section class=\"media-text style-1\">\n                                        <div class=\"row vertical-center media-right\">\n                                            <div class=\"content-block media-text-text col-lg-6 \">\n                                                <section>\n                                <div class=\"article-wrap\">\n                                    <header class=\"content-block-header\">\n                                                                                    <h3>ILLUMINATE HIDDEN THREATS<\/h3>\n                                                                            <\/header>\n                                                                    <div class=\"content-block-content\">\n                                        <p>The cybercrime underground ecosystem is constantly mutating and evolving. Its most harmful operations are hidden in its darkest corners. KELA penetrates these hard-to-reach corners to automatically collect and analyze this information. KELA\u2019s data lake, the hub where all of this information is securely stored, is the source of all of our intelligence operations. Built with cybercriminal methodologies in mind, KELA\u2019s technologies make all of this information accessible in a number of ways. Based on our customers\u2019 organizational requirements, KELA\u2019s products are each designed with a unique purpose to ensure that most critical intelligence is available to them in the most scalable and accessible way possible.<\/p>\n                                    <\/div>\n                                                                                            <\/div>\n                        <\/section>\n                    <\/div>\n                                            <div class=\"content-block media-text-media col-lg-6 \">\n                                            <section>\n                            <div class=\"article-wrap kela-article-wrap\">\n                                <div class=\"block-image-container k7\">\n                                                                        <img decoding=\"async\" src=\"\" alt=\"\" class=\"img-fluid\">\n                                <\/div>\n                            <\/div>\n                        <\/section>\n                    <\/div>\n                <\/div>\n        <\/section>\n    <\/div>\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920 105.56\" class=\"bottom-curve\"><path class=\"cls-1\" d=\"M953.61,77C588.27,77,254.57,50.35,0,0V105.56H1920V1.25C1662.05,51.16,1322.89,77,953.61,77Z\"\/><\/svg>\n    <\/div>\n\r\n\r\n<div  class=\"content-section-wrap callout-resources  alignfull section-title-center\" >\n            <div class=\"container\">\n        <section class=\"callout-resouces-text-section-container\">\n            <div class=\"row \">\n                <div class=\"content-block col-lg-12 col-md-12 callout-resources-text-content\">\n                    <article>\n                                                    <header class=\"about-two-heading\">\n                                                                    <h2 class=\"about-two-title mb-5\">Read more from KELA<\/h2>\n                                                            <\/header>\n                                                                                            <\/article>\n                <\/div>\n                <div class=\"col-md-12 col-lg-12\">\n                    <div class=\"row  uniform\">\n                                                                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2020\/05\/5-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\">Access-as-a-Service &#8211; Remote Access Markets in the Cybercrime Underground<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/access-as-a-service-remote-access-markets-in-the-cybercrime-underground\/\" title=\"Access-as-a-Service - Remote Access Markets in the Cybercrime Underground\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                            <div class=\"col-md-4\">\n                                    <div class=\"resource-container\">\n                                        <div class=\"resource uniform-element\">\n                                            <img decoding=\"async\" width=\"400\" height=\"180\" src=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-400x180.png 400w, https:\/\/www.kelacyber.com\/wp-content\/uploads\/2021\/01\/10new-932x420.png 932w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>                                            <h3 class=\"resource-title\"><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\">$1 Million is Just the Beginning: Q4 2020 in Network Access Sales<\/a><\/h3>\n                                            <div class=\"tab-resource-content\">\n                                                                                            <\/div>\n                                            <!-- <div class=\"resource-link\">\n                                                <p class=\"decorated text-right\"><span><a href=\"https:\/\/www.kelacyber.com\/blog\/1-million-is-just-the-beginning-q4-2020-in-network-access-sales\/\" title=\"$1 Million is Just the Beginning: Q4 2020 in Network Access Sales\" class=\"decorated\">Read More<\/a><\/span><\/p>\n                                            <\/div> -->\n                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                                                                                                                        <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n        <\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":0,"parent":13920,"menu_order":18,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-product-single.php","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-21127","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"blogimg":false,"teamimg":false,"pressimg":false,"blogthumb":false,"bloghimg":false,"bloghvid":false,"bloginner":false,"blogrelated":false,"product-icon":false,"alm-thumbnail":false},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/21127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=21127"}],"version-history":[{"count":11,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/21127\/revisions"}],"predecessor-version":[{"id":21524,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/21127\/revisions\/21524"}],"up":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13920"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=21127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}