Kela - Cyber Threat Intelligence

Kela - Cyber Threat Intelligence company information, Employees & Contact Information

An award-winning cybercrime threat intelligence firm, KELA's mission is to provide 100% real, actionable intelligence on threats emerging from the cybercrime underground, to support the prevention of digital crimes. Our success is based on a unique integration of our proprietary automated technologies and qualified intelligence experts. Trusted worldwide, our technology infiltrates hidden underground places and thoroughly monitors, hunts, and mitigates digital crimes to uncover real risks and allow proactive protection. KELA’s tailored threat visibility, combined with cybercrime attack surface intelligence, arms you with highly contextualized intelligence, as seen from the eyes of attackers, thus enabling proactive network defense.
Looking for a particular Kela - Cyber Threat Intelligence employee's phone or email?

Kela - Cyber Threat Intelligence Questions

News

Hidden Threat: North Korean IT Workers Exposed - KELA Cyber Threat Intelligence

Hidden Threat: North Korean IT Workers Exposed KELA Cyber Threat Intelligence

Ransomware Threat Actor Profile: Qilin - KELA Cyber Threat Intelligence

Ransomware Threat Actor Profile: Qilin KELA Cyber Threat Intelligence

5 Changes Reshaping the CTI Market - KELA Cyber Threat Intelligence

5 Changes Reshaping the CTI Market KELA Cyber Threat Intelligence

Report: How Black Basta Tapped into the PhaaS Market - KELA Cyber Threat Intelligence

Report: How Black Basta Tapped into the PhaaS Market KELA Cyber Threat Intelligence

Warlock’s Attack on Colt Leak Analyzed: Sensitive Files Potentially Exposed - KELA Cyber Threat Intelligence

Warlock’s Attack on Colt Leak Analyzed: Sensitive Files Potentially Exposed KELA Cyber Threat Intelligence

DeepSeek R1 Exposed: Security Flaws in China’s AI Model - KELA Cyber Threat Intelligence

DeepSeek R1 Exposed: Security Flaws in China’s AI Model KELA Cyber Threat Intelligence

How Real-World Conflict Sparks Surge in Hacktivist Attacks - KELA Cyber Threat Intelligence

How Real-World Conflict Sparks Surge in Hacktivist Attacks KELA Cyber Threat Intelligence

2025 AI Threat Report: How cybercriminals are weaponizing AI technology - KELA Cyber Threat Intelligence

2025 AI Threat Report: How cybercriminals are weaponizing AI technology KELA Cyber Threat Intelligence

Inside the Infostealer Epidemic: Exposing the Risks to Corporate Security Report - KELA Cyber Threat Intelligence

Inside the Infostealer Epidemic: Exposing the Risks to Corporate Security Report KELA Cyber Threat Intelligence

Hellcat Hacking Group Unmasked: Investigating Rey and Pryx - KELA Cyber Threat Intelligence

Hellcat Hacking Group Unmasked: Investigating Rey and Pryx KELA Cyber Threat Intelligence

IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader - KELA Cyber Threat Intelligence

IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader KELA Cyber Threat Intelligence

Could The Belsen Group Be Associated With ZeroSevenGroup? - KELA Cyber Threat Intelligence

Could The Belsen Group Be Associated With ZeroSevenGroup? KELA Cyber Threat Intelligence

Data Breach or Infostealer - What’s the Real Culprit? - KELA Cyber Threat Intelligence

Data Breach or Infostealer - What’s the Real Culprit? KELA Cyber Threat Intelligence

AI Jailbreaking Interest Surged 50% in 2024 – How Defenders Can Keep Up - KELA Cyber Threat Intelligence

AI Jailbreaking Interest Surged 50% in 2024 – How Defenders Can Keep Up KELA Cyber Threat Intelligence

The State of Cybercrime 2025 Report - KELA Cyber Threat Intelligence

The State of Cybercrime 2025 Report KELA Cyber Threat Intelligence

XSS Forum Seized: KELA Reveals User Reactions and Speculations - KELA Cyber Threat Intelligence

XSS Forum Seized: KELA Reveals User Reactions and Speculations KELA Cyber Threat Intelligence

Understanding the Infostealer Epidemic in 2025: Highlights from KELA’s 2025 Report - KELA Cyber Threat Intelligence

Understanding the Infostealer Epidemic in 2025: Highlights from KELA’s 2025 Report KELA Cyber Threat Intelligence

How Phishing-as-a-Service Fuels Cybercrime at Scale - KELA Cyber Threat Intelligence

How Phishing-as-a-Service Fuels Cybercrime at Scale KELA Cyber Threat Intelligence

Key Cyber Threats Facing the Financial Sector in 2025 - KELA Cyber Threat Intelligence

Key Cyber Threats Facing the Financial Sector in 2025 KELA Cyber Threat Intelligence

Darknet Markets Explained: Navigating the Hidden Web - KELA Cyber Threat Intelligence

Darknet Markets Explained: Navigating the Hidden Web KELA Cyber Threat Intelligence

Top 5 Data Leak Forums in the Cybercrime Underground Market - KELA Cyber Threat Intelligence

Top 5 Data Leak Forums in the Cybercrime Underground Market KELA Cyber Threat Intelligence

Alibaba’s Qwen 2.5-VL Model is Also Vulnerable to Prompt Attacks - KELA Cyber Threat Intelligence

Alibaba’s Qwen 2.5-VL Model is Also Vulnerable to Prompt Attacks KELA Cyber Threat Intelligence

Anubis: A New Ransomware Threat - KELA Cyber Threat Intelligence

Anubis: A New Ransomware Threat KELA Cyber Threat Intelligence

Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? - KELA Cyber Threat Intelligence

Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? KELA Cyber Threat Intelligence

Work Smarter in 2025: 7 Benefits of Automating CTI into SOC Activities - KELA Cyber Threat Intelligence

Work Smarter in 2025: 7 Benefits of Automating CTI into SOC Activities KELA Cyber Threat Intelligence

Infostealers Under the Spotlight: What are Infostealers and Why Do You Need to Know? - KELA Cyber Threat Intelligence

Infostealers Under the Spotlight: What are Infostealers and Why Do You Need to Know? KELA Cyber Threat Intelligence

8 Reasons You Need Cyber Threat Intelligence for Your Organization - KELA Cyber Threat Intelligence

8 Reasons You Need Cyber Threat Intelligence for Your Organization KELA Cyber Threat Intelligence

Uncovering Your Adversaries with KELA’s Threat Actors Hub - KELA Cyber Threat Intelligence

Uncovering Your Adversaries with KELA’s Threat Actors Hub KELA Cyber Threat Intelligence

KELA is Named One to Watch in the Data Enrichment Category of Snowflake’s 2023 Next-Generation Cybersecurity Applications Report! - KELA Cyber Threat Intelligence

KELA is Named One to Watch in the Data Enrichment Category of Snowflake’s 2023 Next-Generation Cybersecurity Applications Report! KELA Cyber Threat Intelligence

2024 Paris Olympics: Compromised Before the Starting Gun - KELA Cyber Threat Intelligence

2024 Paris Olympics: Compromised Before the Starting Gun KELA Cyber Threat Intelligence

Telegram’s Policy Shift: How Cybercriminals Are Reacting to New Data Sharing Rules - KELA Cyber Threat Intelligence

Telegram’s Policy Shift: How Cybercriminals Are Reacting to New Data Sharing Rules KELA Cyber Threat Intelligence

I-Soon Leak Exposes Chinese Cyber Espionage Operations - KELA Cyber Threat Intelligence

I-Soon Leak Exposes Chinese Cyber Espionage Operations KELA Cyber Threat Intelligence

BreachForums Seized by FBI: Inside the Notorious Cybercrime Marketplace - KELA Cyber Threat Intelligence

BreachForums Seized by FBI: Inside the Notorious Cybercrime Marketplace KELA Cyber Threat Intelligence

Revealing Corporate Vulnerabilities: Understanding How Threat Actors Breach and Exploit Your Data - KELA Cyber Threat Intelligence

Revealing Corporate Vulnerabilities: Understanding How Threat Actors Breach and Exploit Your Data KELA Cyber Threat Intelligence

Navigating Cyber Threats: A Dive into Third-Party Risks and the Aldo Incident - KELA Cyber Threat Intelligence

Navigating Cyber Threats: A Dive into Third-Party Risks and the Aldo Incident KELA Cyber Threat Intelligence

Evolving Info-Stealers: RedLine, Raccoon & New Threats - KELA Cyber Threat Intelligence

Evolving Info-Stealers: RedLine, Raccoon & New Threats KELA Cyber Threat Intelligence

Cyclops Ransomware Gang Unveils Knight 2.0 RaaS Operation: Partner-Friendly and Expanding Targets - KELA Cyber Threat Intelligence

Cyclops Ransomware Gang Unveils Knight 2.0 RaaS Operation: Partner-Friendly and Expanding Targets KELA Cyber Threat Intelligence

Off-the-shelf Ransomware Source Code is a New Weapon for Threat Actors - KELA Cyber Threat Intelligence

Off-the-shelf Ransomware Source Code is a New Weapon for Threat Actors KELA Cyber Threat Intelligence

Leaked Credentials vs. Compromised Accounts: Key Differences - KELA Cyber Threat Intelligence

Leaked Credentials vs. Compromised Accounts: Key Differences KELA Cyber Threat Intelligence

Russia-Ukraine War: Pro-Russian Hacktivist Activity Two Years On - KELA Cyber Threat Intelligence

Russia-Ukraine War: Pro-Russian Hacktivist Activity Two Years On KELA Cyber Threat Intelligence

Akira Ransomware Gang Evades Decryptor, Exploiting Victims Uninterruptedly - KELA Cyber Threat Intelligence

Akira Ransomware Gang Evades Decryptor, Exploiting Victims Uninterruptedly KELA Cyber Threat Intelligence

5 Questions (and Answers) About the Kyivstar Attack - KELA Cyber Threat Intelligence

5 Questions (and Answers) About the Kyivstar Attack KELA Cyber Threat Intelligence

5 Questions About Hamas-Israel War - KELA Cyber Threat Intelligence

5 Questions About Hamas-Israel War KELA Cyber Threat Intelligence

Surviving the QakBot Takedown: Black Basta and Knight Ransomware Operations - KELA Cyber Threat Intelligence

Surviving the QakBot Takedown: Black Basta and Knight Ransomware Operations KELA Cyber Threat Intelligence

Qilin Ransomware Gang Adopts Uncommon Payment System: All Ransom Payments Funneled through Affiliates - KELA Cyber Threat Intelligence

Qilin Ransomware Gang Adopts Uncommon Payment System: All Ransom Payments Funneled through Affiliates KELA Cyber Threat Intelligence

The Secret Life of an Initial Access Broker - KELA Cyber Threat Intelligence

The Secret Life of an Initial Access Broker KELA Cyber Threat Intelligence

LockBit 2.0 Interview with Russian OSINT - KELA Cyber Threat Intelligence

LockBit 2.0 Interview with Russian OSINT KELA Cyber Threat Intelligence

From Initial Access to Ransomware Attack – 5 Real Cases Showing the Path from Start to End - KELA Cyber Threat Intelligence

From Initial Access to Ransomware Attack – 5 Real Cases Showing the Path from Start to End KELA Cyber Threat Intelligence

Hunting Down Initial Access Brokers with DARKBEAST - KELA Cyber Threat Intelligence

Hunting Down Initial Access Brokers with DARKBEAST KELA Cyber Threat Intelligence

Telegram’s CEO and Founder Durov Under Arrest: Cybercriminals React - KELA Cyber Threat Intelligence

Telegram’s CEO and Founder Durov Under Arrest: Cybercriminals React KELA Cyber Threat Intelligence

Access-as-a-Service – Remote Access Markets in the Cybercrime Underground - KELA Cyber Threat Intelligence

Access-as-a-Service – Remote Access Markets in the Cybercrime Underground KELA Cyber Threat Intelligence

2easy: Logs Marketplace on the Rise - KELA Cyber Threat Intelligence

2easy: Logs Marketplace on the Rise KELA Cyber Threat Intelligence

Six Months Into Breached: The Legacy of Raidforums? - KELA Cyber Threat Intelligence

Six Months Into Breached: The Legacy of Raidforums? KELA Cyber Threat Intelligence

Raidforums Leaked Database – Insights and Intelligence by Kela - KELA Cyber Threat Intelligence

Raidforums Leaked Database – Insights and Intelligence by Kela KELA Cyber Threat Intelligence

Cyber Threats to Australian Mining: Leaked Data & Network Risks - KELA Cyber Threat Intelligence

Cyber Threats to Australian Mining: Leaked Data & Network Risks KELA Cyber Threat Intelligence

Telegram Clouds of Logs – The Fastest Gateway to Your Network - KELA Cyber Threat Intelligence

Telegram Clouds of Logs – The Fastest Gateway to Your Network KELA Cyber Threat Intelligence

Top Kela - Cyber Threat Intelligence Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant