KELA (@intel_by_kela) 's Twitter Profile
KELA

@intel_by_kela

The global leader in actionable threat intelligence. Read our latest research at kelacyber.com

ID: 1265956610465300481

linkhttps://kelacyber.com/ calendar_today28-05-2020 10:42:49

610 Tweet

7,7K Followers

523 Following

KELA (@intel_by_kela) 's Twitter Profile Photo

Infostealers Are Surging in 2025 - Is Your Security Team Ready? Cybercriminals are wasting no time in 2025, with infostealer malware fueling credential theft, corporate breaches, and dark web markets at an alarming rate. Why should SOC teams and threat hunters care? - Stolen

Infostealers Are Surging in 2025 - Is Your Security Team Ready? Cybercriminals are wasting no time in 2025, with infostealer malware fueling credential theft, corporate breaches, and dark web markets at an alarming rate. Why should SOC teams and threat hunters care?
- Stolen
KELA (@intel_by_kela) 's Twitter Profile Photo

NYC - June 5: Join KELA on the Front Lines of Threat Intelligence. SOC teams, threat analysts, law enforcement - this one’s for you. Dive into real-world threat investigations in a live, hands-on workshop with KELA. - Investigate threats targeting your domain - Learn from a

NYC -  June 5: Join KELA on the Front Lines of Threat Intelligence. SOC teams, threat analysts, law enforcement - this one’s for you. Dive into real-world threat investigations in a live, hands-on workshop with KELA.

- Investigate threats targeting your domain
- Learn from a
KELA (@intel_by_kela) 's Twitter Profile Photo

🎙️ 最新エピソード公開! 今回のゲストは、孤高の脅威ハンターとして知られる 名和利男氏。 テーマは「クラウドセキュリティ」。 コロナ禍やウクライナ戦争を経て急速に普及したクラウド。その一方で、攻撃者にとっても新たな狙い所となっています。 ☁️ クラウド特有の攻撃手法 🔐

KELA (@intel_by_kela) 's Twitter Profile Photo

Join us at live webinar where we explore findings from leaked Black Basta ransomware group chats, exposing how these top-tier cybercriminals utilize Phishing-as-a-Service (PhaaS) for initial network access. 📅 Tuesday, June 10 🕒 10:00 AM EST In this session, you’ll: - See how

Join us at live webinar where we explore findings from leaked Black Basta ransomware group chats, exposing how these top-tier cybercriminals utilize Phishing-as-a-Service (PhaaS) for initial network access. 

📅 Tuesday, June 10
🕒 10:00 AM EST

In this session, you’ll:
- See how
KELA (@intel_by_kela) 's Twitter Profile Photo

Are you in New York soon? Join KELA on June 5 at The Smith, NYC for "AI Meets the Dark Web:" a hands-on, interactive Threat Intelligence Workshop. This isn’t a lecture - it’s a live experience. What’s in store: - Investigate your organization’s domain using KELA’s platform -

Are you in New York soon? Join KELA on June 5 at The Smith, NYC for "AI Meets the Dark Web:" a hands-on, interactive Threat Intelligence Workshop. This isn’t a lecture - it’s a live experience.

What’s in store:

- Investigate your organization’s domain using KELA’s platform
-
KELA (@intel_by_kela) 's Twitter Profile Photo

🕵️‍♀️Black Basta's Use of PhaaS: What You Need to Know. Join our live webinar as we break down how this ransomware group uses Phishing-as-a-Service (PhaaS) to breach networks - backed by insights from real leaked chats. 📅 Tuesday, June 10 🕒 10:00 AM EST What you’ll learn: •

🕵️‍♀️Black Basta's Use of PhaaS: What You Need to Know.

Join our live webinar as we break down how this ransomware group uses Phishing-as-a-Service (PhaaS) to breach networks - backed by insights from real leaked chats.

📅 Tuesday, June 10
🕒 10:00 AM EST

What you’ll learn:
•
KELA (@intel_by_kela) 's Twitter Profile Photo

Infostealers are exploding - and so are the threats they fuel. With infections up 266%, these tools are now a key driver of ransomware, identity fraud, and data breaches. Watch our on-demand webinar featuring Lin Levi, Threat Intelligence Analyst at KELA, as she unpacks how

Infostealers are exploding  - and so are the threats they fuel. With infections up 266%, these tools are now a key driver of ransomware, identity fraud, and data breaches. Watch our on-demand webinar featuring Lin Levi, Threat Intelligence Analyst at KELA, as she unpacks how
KELA (@intel_by_kela) 's Twitter Profile Photo

ファイアウォール、EDR、SIEM —— これらはネットワーク内部の脅威を検知するのに優れたツールです。 しかし、境界の外側で進行している攻撃にはどう対応していますか? Frost &

KELA (@intel_by_kela) 's Twitter Profile Photo

🕵️‍♀️How Black Basta Uses PhaaS to Power Ransomware Attacks. Join us live on June 10 to explore leaked chats that reveal how this top ransomware group leverages Phishing-as-a-Service platforms to gain initial access. What’s inside: Real conversations between threat actors Deep dive

🕵️‍♀️How Black Basta Uses PhaaS to Power Ransomware Attacks. Join us live on June 10 to explore leaked chats that reveal how this top ransomware group leverages Phishing-as-a-Service platforms to gain initial access.
What’s inside:
Real conversations between threat actors

Deep dive
KELA (@intel_by_kela) 's Twitter Profile Photo

🕵️‍♀️Live Tomorrow: Black Basta & the Rise of Phishing-as-a-Service (PhaaS). Even the most notorious ransomware groups outsource. Join KELA’s Hagar Buchnik as she unpacks how Black Basta leverages Phishing-as-a-Service to gain initial access and execute attacks - based on real

🕵️‍♀️Live Tomorrow: Black Basta & the Rise of Phishing-as-a-Service (PhaaS). Even the most notorious ransomware groups outsource. Join KELA’s Hagar Buchnik as she unpacks how Black Basta leverages Phishing-as-a-Service to gain initial access and execute attacks - based on real
KELA (@intel_by_kela) 's Twitter Profile Photo

Phishing-as-a-Service (PhaaS) has exploded in popularity across cybercrime forums and Telegram channels, growing in interest by over 650% between Q1 2023 and Q1 2025. What was once a tool for low-level scammers has now become a core component of top-tier ransomware operations.

Phishing-as-a-Service (PhaaS) has exploded in popularity across cybercrime forums and Telegram channels, growing in interest by over 650% between Q1 2023 and Q1 2025. What was once a tool for low-level scammers has now become a core component of top-tier ransomware operations.
KELA (@intel_by_kela) 's Twitter Profile Photo

Missed our live webinar on Black Basta’s use of Phishing-as-a-Service (PhaaS)? You can still catch up. We uncovered insights from leaked chats exposing how this notorious ransomware group outsources initial access - and what that means for your defenses. 🎥 Watch on-demand:

Missed our live webinar on Black Basta’s use of Phishing-as-a-Service (PhaaS)? You can still catch up. We uncovered insights from leaked chats exposing how this notorious ransomware group outsources initial access - and what that means for your defenses. 🎥 Watch on-demand:
KELA (@intel_by_kela) 's Twitter Profile Photo

The world of Cyber Threat Intelligence (CTI) is rapidly evolving, and 2025 marks a critical turning point. With over 200 vendors in the space, AI reshaping intelligence, and ongoing M&A activity, CTI is no longer a niche function—it’s a core pillar of modern security operations.

The world of Cyber Threat Intelligence (CTI) is rapidly evolving, and 2025 marks a critical turning point. With over 200 vendors in the space, AI reshaping intelligence, and ongoing M&A activity, CTI is no longer a niche function—it’s a core pillar of modern security operations.
KELA (@intel_by_kela) 's Twitter Profile Photo

We stand with Israel, and are proud to be part of its world-renowned technology and intelligence community — built on resilience, innovation, and unwavering values. We carry this legacy forward — delivering intelligence that empowers organizations and nations to stay secure,

We stand with Israel, and are proud to be part of its world-renowned technology and intelligence community — built on resilience, innovation, and unwavering values. We carry this legacy forward — delivering intelligence that empowers organizations and nations to stay secure,
KELA (@intel_by_kela) 's Twitter Profile Photo

We love to share our customer successes! Today, we’re proud to announce that Sysmex Corporation, a trusted global leader in healthcare solutions, has chosen the KELA Group, including KELA - Cyber Threat Intelligence, ULTRA RED, and SLING to strengthen its defenses and build

We love to share our customer successes! Today, we’re proud to announce that Sysmex Corporation, a trusted global leader in healthcare solutions, has chosen the KELA Group, including KELA - Cyber Threat Intelligence, ULTRA RED, and SLING to strengthen its defenses and build
KELA (@intel_by_kela) 's Twitter Profile Photo

Webinar | Iran, Cyber, and the Darknet: What We've Seen – and What's Coming Next. Join KELA on June 19 at 2PM Central European Time for a sharp, intelligence-driven briefing on the evolving cyber landscape tied to the Israel-Iran conflict. We'll break down: - Key developments

Webinar | Iran, Cyber, and the Darknet: What We've Seen – and What's Coming Next. Join KELA on June 19 at 2PM Central European Time for a sharp, intelligence-driven briefing on the evolving cyber landscape tied to the Israel-Iran conflict. We'll break down:

- Key developments
KELA (@intel_by_kela) 's Twitter Profile Photo

Back by popular demand, KELA’s Threat Intelligence Team is offering an exclusive session for North America’s threat intelligence and security professionals. In this session, KELA’s Threat Intelligence Analyst, Hagar Buchnik, is back to uncover how the notorious Black Basta

Back by popular demand, KELA’s Threat Intelligence Team is offering an exclusive session for North America’s threat intelligence and security professionals. In this session, KELA’s Threat Intelligence Analyst, Hagar Buchnik, is back to uncover how the notorious Black Basta
KELA (@intel_by_kela) 's Twitter Profile Photo

弊社の最新調査によると、情報窃取型マルウェア(インフォスティーラー)の急増が確認されており、これはランサムウェア攻撃や認証情報の漏洩を起因とする侵害の主要な要因となっています。 新たに発表されたレポートでは、300件以上の被害者を分析し、以下の傾向が明らかになりました: *