UPCOMING EVENT / Webinar: Why CTI is a MUST-HAVE for Educational Institutions, September 28, 2 PM EDT

Secure your spot

Success Stories

Success Stories

Welcome to our “Success Stories” section! Here, we’ve got some real life stories to share about how KELA’s Cyber Threat Intelligence helped different companies crush their digital challenges. It’s like reading real-life superhero tales, but with hackers as the bad guys. Get ready to be inspired!

July 23, 2023

Osaka University of Economics Utilizes KELA to Establish Cyber Defense

A few years ago, Universities had to shift to remote teaching methods due to Covid-19, which resulted in increased vulnerability of CTI systems to cyber-attacks. Osaka University responded proactively by devising a plan to strengthen their cyber security and chose KELA’s Cyber Threat Intelligence platform to support them.
July 23, 2023

US Law Enforcement Agency Prevents Fraud With KELA’s Cyber Intelligence Platform

As part of an ongoing automated cybercrime attack surface monitoring for a customer – a US Law Enforcement Agency, KELA’s Platform detected an image of a check from a fraud-dedicated Telegram group. The check was written by a police officer from the agency. The timely findings enabled the customer to remediate the threat.
July 20, 2023

KELA Detects Leaked Credit Card Numbers Belonging To Financial Services Corporation

KELA recently utilized its automated attack surface monitoring module to identify a list of credit card numbers that belonged to a Japanese Financial Company. Fortunately, KELA had pre-set each credit card issued by the company as a monitored organizational asset on its platform. These cards were active and had a cumulative balance of over $750,000.
July 20, 2023

KELA Successfully Prevents A Cyberattack On A Large Telecom Company

KELA detected a compromised account associated with a resource connected to a major telecommunications domain. As the company requested to purchase the bot files to assess the risk, KELA found that the files were no longer available. Read more to learn how KELA prevented a compromised account threat from becoming a cyberattack.