As part of its ongoing mission to empower organizations to neutralize cyber threats, KELA introduces its Technical Cybercrime Intelligence: automatic detection of potentially compromised IPs and domains involved in cybercrime activity, detected in cybercrime sources such as closed forums, illicit markets, automated cybercrime shops, instant messaging channels used by criminals, and more. This intelligence is available to consume via Snowflake as a machine-readable feed and can be easily integrated into your security appliances.
Use KELA’s Technical Intelligence to monitor the latest compromised network assets that can be exploited by threat actors for their next cyber attack. Such assets can be abused to serve as an attack infrastructure (for example, as a C2 server) or as an attack vector such as phishing attacks.
Easily integrate KELA's Technical Cybercrime Intelligence into your SIEM, SOAR, or any other security solution, and get full coverage of your cybercrime attack surface to protect your organization from potential threats before they cause harm.
** This is only a sample dataset that contains a few hundreds rows of data taken from the full Intelligence dataset - available as a separate personalized listing item. The samples update on weekly basis.
Sample Tables:
- Sample
Fields Included:
- IP/Domain
- Description
- STIX Pattern
- STIX object
- Source info