Silent Push uncovered a massive IPTV-based piracy network, hosted across 1,000+ domains and 10,000+ IPs, affecting more than 20 major brands.| Silent Push
How do you fight an enemy that operates a shadow network larger than many legitimate global enterprises? You learn to see their infrastructure BEFORE it gets used. Our Threat Analysts recently unmasked a sophisticated IPTV piracy ring built on over 10,000 IP addresses and 1,100 domains. Their purpose? To illegally profit from the content of […] The post Webinar – Stopping Piracy Distribution Networks At Scale appeared first on Silent Push.| Silent Push
Silent Push helps cybersecurity teams block threats early, by delivering attacker infrastructure intelligence at scale, with context and insight not available in any other CTI platform. By identifying adversary campaigns as they are being setup, Silent Push significantly minimizes risk, reduces cost, and improves efficiency by replacing multiple CTI tools in one platform. Ready to […] The post Preemptive Cyber Defense Use-Cases appeared first on Silent Push.| Silent Push
Silent Push integrates proprietary threat intelligence and Indicators of Future Attack (IOFA)™ directly into your existing SIEM and SOAR platforms to automate decisions and accelerate response times. This enables your team to shift to a proactive defense posture by preemptively discovering attacker infrastructure, all without complex changes to your current security stack. Ready to dive […] The post Integrations Overview appeared first on Silent Push.| Silent Push
Infrastructure Laundering is a criminal practice of intermediaries enabling threat actors to hide infrastructure with major cloud providers.| Silent Push
Silent Push is proud to announce a new strategic partnership with CyberLion Ltd., a leading cybersecurity distributor specialising in enterprise and government-grade defense solutions across the EMEA region. This partnership marks a significant step forward in Silent Push’s expansion into EMEA markets, providing partners with direct access to the Silent Push platform – a preemptive […] The post Silent Push Expands EMEA Footprint Through Strategic Partnership with CyberLion appeared ...| Silent Push
SocGholish, operated by TA569, acts as a Malware-as-a-Service vendor, selling access to compromised systems to cybercriminal clients, usually in the form of "fake browser update" lures. The post Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569 appeared first on Silent Push.| Silent Push
We've introduced a tagging system - for all subscription levels - that categorizes every IPv4 address we scan as a VPN, residential proxy, or sinkhole, with detailed sub-categories available for each. The data is then passed onto Community and Enterprise users via the Total View screen, and as a filterable bulk download available for Enterprise users only. The post IP Tagging in Silent Push: VPN, Proxy and Sinkhole Detection appeared first on Silent Push.| Silent Push
We've added plenty of new functionality to our data enrichment feature - you can now enrich an ASN and an IPv6 address. We've also provided Enterprise users the ability to drill-down into IOFA Feed data with a dedicated space for curated IOFA Feeds, and an all-new 'Feed Analytics' screen. The post Silent Push Expands Cyber Defense Capabilities with VPN, Proxy, and Sinkhole Tagging on all Public IP Addresses appeared first on Silent Push.| Silent Push
Threat analysts often face too many signals, limited context, and disconnected tools — slowing investigations and increasing the risk of missing early attacker infrastructure. In this session, we’ll share a practical, repeatable workflow for quickly mapping attacker infrastructure. Using the Silent Push free Community Edition, we’ll show how to pivot across domains, IPs, and certificates […] The post Workshop – Investigating Infrastructure: A Practical Workflow for Threat Analysts a...| Silent Push
SocGholish, known as the pioneer of fake browser update attacks, remains one of the most effective initial access tools in the wild. Join us on August 21 as we take a deep dive into the SocGholish ecosystem, tracing how a single deceptive JavaScript injection leads to full system compromise. You’ll learn how a proactive approach to detection — focused on […] The post Webinar – SocGholish: From Fake Updates to Real Breaches appeared first on Silent Push.| Silent Push
Expose pre-weaponized adversary infrastructure with Indicators of Future Attack™.| Silent Push
Silent Push Threat Analysts have observed the FIN7 group (aka Sangria Tempest) using new tactics in their malware and phishing attacks, with the creation of at least seven websites serving malware to visitors looking to use an “AI Deepnude generator” and continued use of browser extension honeypots.| Silent Push
Silent Push are tracking a Russia-linked threat actor who is deploying crypto scam domains targeting the US election, and US tech brands.| Silent Push
Silent Push Threat Analysts have used content similarity scans to reveal 2,500+ unique IOFA domains and IPs hosting illegal pharmacy content.| Silent Push
Silent Push tracks 2,000+ domains and IPs affected by ClickFix fake browser update malware, using proprietary JavaScript scans.| Silent Push
Monitor the entire Internet daily for cyber threats and gain comprehensive insights into global internet infrastructure with Silent Push Community Edition.| Silent Push
Explore the Silent Push blog for in-depth perspectives and innovative insights on threat intelligence security. Search by post type and category today.| Silent Push
Silent Push threat analysts are currently tracking a campaign that uses fake websites and social engineering to serve a copy of the AnyDesk remote access software to Windows and macOS users, that is then being used to steal data and money once installed on a victim's machine. Brands targeted include UK banks HSBC, Natwest, Lloyds,| Silent Push - We Know First
In this blog, we’ll take you through how the Silent Push console and API outputs risk scores, and how to utilize scoring methodologies to level-up your threat intelligence operation. We'll explain how each score is calculated, including the different factors we take into account, and how to operationalize the data.| Silent Push - We Know First
Silent Push's forward and reverse passive DNS lookup functionality allows you to perform a deep dive into enriched intelligence datasets, interrogate zone data, map out malicious infrastructure and analyze attacker TTPs using a first-party dataset that is original, aggregated at source, and uniquely designed to create searchable spaces related to specific attack vectors.| Silent Push - We Know First
Live Scan allows you to extract real-time data from a single URL on the clearnet or darkweb, across a range of categories, and view historical scan results for the specified URL.| Silent Push - We Know First
This blog will take you through how to enrich domains or IPs in Silent Push, understand each enrichment category and get the most out of the enrichment feature by outlining useful functions such as pivoting and API capability.| Silent Push - We Know First
Think of threat feeds as a live weather reporting system, offering up new information that can help you prepare for a storm that is coming your way, or alerting you to one that is already circling overhead.| Silent Push - We Know First
Silent Push Analysts have used content scans to reverse-engineer FIN7 TTPs, and uncover phishing and browser extension malware infrastructure targeting the following organizations: Louvre Museum, Meta, Reuters, Microsoft 365, Wall Street Journal, Midjourney, CNN, Quickbooks, Alliant, Grammarly, Airtable, Webex, Lexis Nexis, Bloomberg, and Quicken.| Silent Push - Know First
Silent Push Threat Analysts have uncovered 24 control panels administering MaaS services for a range of DukeEugene variants - including ERMAC, Hook, Loot, and Pegasus - targeting users of popular mobile banking software and crypto currency exchanges.| Silent Push - We Know First
Indicators of Future Attack (IOFA) Feed data provides realtime, actionable intelligence for your existing security stack.| Silent Push