Intel_by_KELA Profile Banner
KELA Profile
KELA

@Intel_by_KELA

Followers
7K
Following
873
Statuses
565

The global leader in actionable threat intelligence. Read our latest research at https://t.co/jnPRREVHOb

Joined May 2020
Don't wanna be here? Send us removal request.
@Intel_by_KELA
KELA
2 days
Read the full analysis here
0
0
0
@Intel_by_KELA
KELA
7 days
đź“– Read here
0
1
0
@Intel_by_KELA
KELA
13 days
Read here!
0
0
0
@Intel_by_KELA
KELA
13 days
Read here!
0
0
1
@Intel_by_KELA
KELA
16 days
Read the full analysis here:
0
1
3
@Intel_by_KELA
KELA
16 days
💻 Is GDLockerSec Really Targeting AWS? KELA’s investigation reveals the truth behind the alleged ransomware group GDLockerSec’s claims of targeting Amazon AWS. Despite bold statements, our analysis uncovers: ✅ The group’s exaggerated claims about AWS are based on public datasets unrelated to AWS breaches. ✅ Evidence of poor operational security and amateur tactics. ✅ Links to Moroccan and Algerian cyber actors, suggesting a lack of sophistication compared to major ransomware groups. Bottom Line: GDLockerSec is using inflated claims to gain attention, but their reputation among ransomware groups remains far from credible. 👉 Read the full report and get the facts: #Ransomware #Cybersecurity #AWS #KELAInsights
Tweet media one
0
1
2
@Intel_by_KELA
KELA
26 days
0
0
1
@Intel_by_KELA
KELA
29 days
0
1
1
@Intel_by_KELA
KELA
2 months
Check out this WIRED story about the risks of residential proxies being exploited by #cybercriminals. Our team observed over 1,000 discussions promoting the misuse of proxy networks like Big Mama VPN in underground forums & Telegram channels.
0
0
0
@Intel_by_KELA
KELA
2 months
Infostealers Under the Spotlight: What are Infostealers and Why Do You Need to Know?  💡 Learn how to stay protected with our latest blog: #infostealers #identitytheft #malware #cyberthreatintelligence
Tweet media one
0
0
0
@Intel_by_KELA
KELA
2 months
Infostealers are emerging as a cornerstone of the cybercrime ecosystem, fueling the operations of Initial Access Brokers (IABs) and enabling ransomware, fraud, and more. Understand the tools attackers use and how to stay ahead. Get the guide:
Tweet media one
0
1
0
@Intel_by_KELA
KELA
2 months
🎯 What makes KELA a standout in cybersecurity? KuppingerCole’s new Executive View report reveals how KELA delivers unmatched actionable intelligence with advanced capabilities! Download the Free Report: #kuppingercole #threatintelligence #kelacti
Tweet media one
0
0
0
@Intel_by_KELA
KELA
2 months
3 Months Later: Did Cybercriminals Really Leave Telegram? When Telegram announced it would share user data with law enforcement, many thought it marked the end of its role as a cybercrime hub. What actually happened? Read our blog here ➡️➡️ #telegram
Tweet media one
0
0
0
@Intel_by_KELA
KELA
2 months
Behind every strong security team is a Threat Intelligence Analyst. These experts turn chaos into clarity, providing the insights organizations need to anticipate and counter cyber threats. 🔗 Read our latest blog: ➡️ #threatanalyst #threatintelligence
Tweet media one
0
0
0