KELA Monitor CDF
Overview
The monitor integrations are according to their matched KELA modules:
-
KELA Monitor Leaked Credentials
-
KELA Monitor Compromised Accounts
-
KELA Monitor Instant Messaging
-
KELA Monitor Hacking Discussions
-
KELA Monitor Network Vulnerabilities
Each integration creates its own threat objects of type Incidents, together with other objects depending on the integration.
