Threat Landscape
The Threat Situation Analysis module provides an analysis of all current global threat activities, categorized by date (daily/weekly/monthly/yearly), region, industry, and threat groups.
• Analysis is segmented into Ransomware, Network Access, and APT Activities.
• Daily reports generated by the KELA research team summarize global threat activities.
Monitor
• The Threat Monitoring module offers proactive monitoring of information exposed on the dark web, deep web, hacker forums, and hacker chat groups related to the organization.
• Administrators can query domains, IPs or IP ranges, and keywords on the platform.
• Results are automatically categorized, such as hacker forum discussions, chat groups, leaked data, and exposed account credentials.
Identity Guard
• This module monitors accounts exposed on the dark web, deep web, hacker forums, and chat groups, providing a detailed analysis of exposed accounts.
• Analyses include the host's IP, password, operating system, and related websites or services.
• Data includes the quantity and timestamps of credentials gathered via malicious programs on the host.
Investigate
• This module provides manual query capabilities, allowing administrators to search domains, IPs or IP ranges, and keywords.
• Supports logical query operators such as AND/OR/NOT for refined searches.
• Search results can be saved as templates for future reference.
• Results are categorized into hacker forum discussions, chat groups, leaked data, and exposed credentials.
Threat Actors
This module provides analyses of global hacker groups' activities.
• Analyses are region- and group-specific.
• Offers detailed insights into specific groups or hackers, including forum posts, news, tools, and vulnerabilities utilized.
• The module is offered as an annual subscription, including all IOC threat intelligence during the subscription period.
Threat Intelligence
• Provides information on global threats or malicious program websites.
• The platform includes details such as IP addresses, URLs, regions, and sources.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。