Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Kela Launches Technical Cybercrime Intelligence on Snowflake Marketplace

KELA announced that it has partnered with Snowflake, the Data Cloud company, to launch its technical intelligence data on Snowflake Marketplace. KELA’s Technical Cybercrime Intelligence availability on Snowflake Marketplace will enable joint customers to get near-instant, seamless, and secure access to potentially compromised IPs and domains involved in cybercrime activity.

Commenting on the partnership, Itsik Kesler, CTO, said: “Our Technical Cybercrime Intelligence capability will benefit Snowflake customers by providing them with the ability to automatically detect and monitor potentially compromised IPs and domains involved in cybercrime activity. This actionable threat intelligence enables defenders to identify and neutralize cyber threats that they were previously unaware of in real-time, proactively informing them of potential assets used by attackers, and ultimately protecting their organizations from the ever-evolving cyber threat landscape.”

Latest Insights: The Metaverse as the Great Diversity Experiment

KELA and Snowflake are working together to help joint customers remediate potential risks proactively and improve their threat-hunting capabilities by monitoring the latest compromised network assets that can be exploited by threat actors for their next cyber attack. Such assets can be abused to serve as an attack infrastructure, for example, as a C2 server, or as an attack vector, such as phishing attacks. The technology continuously collects posts, images, and other information in various formats from the cybercrime underground, analyzes it to detect potentially compromised assets based on context and source credibility, and shares the information with users via Snowflake’s API in a structured, machine-readable format.

KELA’s Technical Intelligence automatically extracts and collects potentially compromised IPs and domains involved in cybercrime activity in cybercrime sources such as closed forums, illicit markets, automated cybercrime shops, instant messaging channels used by criminals, and more. This intelligence is available to consume via Snowflake as machine-readable data and can be easily integrated into security appliances.

Related Posts
1 of 38,242

Joint customers can now leverage KELA’s Technical Intelligence on Snowflake Marketplace, allowing them to benefit from seamless integration with security solutions, comprehensive coverage of a wide range of cybercrime underground sources, real-time updates on compromised IPs and domains, and the ability to contextualize intelligence by gaining a deeper understanding of the intelligence source and how the asset was compromised.

AiThority: The Use of AI in Hollywood

Snowflake Marketplace is powered by Snowflake’s ground-breaking cross-cloud technology, Snowgrid, allowing companies to find, try, and buy the data and applications needed to innovate for their business. Snowflake Marketplace simplifies discovery, access, and the commercialization of data and applications, enabling companies to unlock entirely new revenue streams and extended insights across the Data Cloud. To learn more about Snowflake Marketplace and how to find, try, and buy the data, data services, and applications needed to innovate for your business, click here.

An award-winning cybercrime threat intelligence firm, KELA’s mission is to provide 100% real, actionable intelligence on threats emerging from the cybercrime underground, to support the prevention of digital crimes. Our success is based on a unique integration of our proprietary automated technologies and qualified intelligence experts. Trusted worldwide, our technology infiltrates hidden underground places and thoroughly monitors, hunts, and mitigates digital crimes to uncover real risks and allow proactive protection. KELA’s revolutionary solution arms you with highly contextualized intelligence, as seen from the eyes of attackers, thus enabling the elimination of blind spots and proactive network defense.

Read More: ChatGPT Won’t Replace Your Marketing Job, But it’s Critical to Leverage for Success

[To share your insights with us, please write to]

Comments are closed.