Latest blog / DeepSeek R1 Exposed: Security Flaws in China’s AI Model

Read Here

Resource

Webinar: Conti Leaks Overview

with Victoria Kivilevich, KELA’s Director of Threat Research

play

Please fill out the form to watch

Fill Out The Form To Watch Now!

Watch this Webinar to learn more about:

What really led to the formation of the modern Conti operation?
Malware and cybercrime tools used by Conti ransomware gang.
Leaked information about Conti's attacks’ process, including multiple steps before and after the ransomware deployment.
KELA's Research team review of top-15 threat actors of the Conti's group