Silent Push uncovered a massive IPTV-based piracy network, hosted across 1,000+ domains and 10,000+ IPs, affecting more than 20 major brands.| Silent Push
Infrastructure Laundering is a criminal practice of intermediaries enabling threat actors to hide infrastructure with major cloud providers.| Silent Push
Expose pre-weaponized adversary infrastructure with Indicators of Future Attack™.| Silent Push
Silent Push Threat Analysts have observed the FIN7 group (aka Sangria Tempest) using new tactics in their malware and phishing attacks, with the creation of at least seven websites serving malware to visitors looking to use an “AI Deepnude generator” and continued use of browser extension honeypots.| Silent Push
Silent Push are tracking a Russia-linked threat actor who is deploying crypto scam domains targeting the US election, and US tech brands.| Silent Push
Silent Push Threat Analysts have used content similarity scans to reveal 2,500+ unique IOFA domains and IPs hosting illegal pharmacy content.| Silent Push
Silent Push tracks 2,000+ domains and IPs affected by ClickFix fake browser update malware, using proprietary JavaScript scans.| Silent Push
Silent Push threat analysts are currently tracking a campaign that uses fake websites and social engineering to serve a copy of the AnyDesk remote access software to Windows and macOS users, that is then being used to steal data and money once installed on a victim's machine. Brands targeted include UK banks HSBC, Natwest, Lloyds,| Silent Push - We Know First
In this blog, we’ll take you through how the Silent Push console and API outputs risk scores, and how to utilize scoring methodologies to level-up your threat intelligence operation. We'll explain how each score is calculated, including the different factors we take into account, and how to operationalize the data.| Silent Push - We Know First
Silent Push's forward and reverse passive DNS lookup functionality allows you to perform a deep dive into enriched intelligence datasets, interrogate zone data, map out malicious infrastructure and analyze attacker TTPs using a first-party dataset that is original, aggregated at source, and uniquely designed to create searchable spaces related to specific attack vectors.| Silent Push - We Know First
Live Scan allows you to extract real-time data from a single URL on the clearnet or darkweb, across a range of categories, and view historical scan results for the specified URL.| Silent Push - We Know First
This blog will take you through how to enrich domains or IPs in Silent Push, understand each enrichment category and get the most out of the enrichment feature by outlining useful functions such as pivoting and API capability.| Silent Push - We Know First
Think of threat feeds as a live weather reporting system, offering up new information that can help you prepare for a storm that is coming your way, or alerting you to one that is already circling overhead.| Silent Push - We Know First
Silent Push Analysts have used content scans to reverse-engineer FIN7 TTPs, and uncover phishing and browser extension malware infrastructure targeting the following organizations: Louvre Museum, Meta, Reuters, Microsoft 365, Wall Street Journal, Midjourney, CNN, Quickbooks, Alliant, Grammarly, Airtable, Webex, Lexis Nexis, Bloomberg, and Quicken.| Silent Push - Know First
Indicators of Future Attack (IOFA) Feed data provides realtime, actionable intelligence for your existing security stack.| Silent Push