New Silent Push research connects a Moldovan election disinformation campaign and threat actor Storm-1679 with a 2022 Russian propaganda effort. The post Silent Push Analyzes New Disinformation Campaign Targeting 2025 Moldovan Elections Connected to Legacy Moscow Influence Campaign appeared first on Silent Push.| Silent Push
Silent Push has discovered a new malware loader that is strongly associated with Russian ransomware gangs that we are naming: “CountLoader.” The post CountLoader: Silent Push Discovers New Malware Loader Being Served in 3 Different Versions appeared first on Silent Push.| Silent Push
This workshop teaches you the proactive malware detection techniques our own analysts use to find malicious infrastructure as it’s being built. Move beyond reactive alerts and start uncovering the next wave of malware loaders, infostealers, and phishing campaigns before they are ever launched. The post Workshop – Advanced Queries for Malware Detection appeared first on Silent Push.| Silent Push
Silent Push raises $10M Series B, bringing total funding to $32M to drive global expansion and deliver preemptive cybersecurity with IOFA™. The post Silent Push Announces $10 Million in Series B Funding appeared first on Silent Push.| Silent Push
Silent Push has identified a group of previously unreported domains used by closely linked Chinese APT actors, including Salt Typhoon.| Silent Push
Explore real malware detections in Silent Push Community Edition and learn how to hunt threats before they become operational. The post Advanced Queries For Real Malware Detection in Silent Push appeared first on Silent Push.| Silent Push
In a strategic move to equip organizations across the Nordic region with next-generation cyber defense, Silent Push has entered into a new partnership with Cybersec (cybersec.fi), Finland’s premier cybersecurity provider focused on intelligence-led SaaS solutions. About the Partnership This collaboration integrates Silent Push’s unique platform, which reveals emerging adversary infrastructure before it is used in […] The post Silent Push and Cybersec Strengthen Preemptive Cyber Defense ...| Silent Push
Silent Push uncovered a massive IPTV-based piracy network, hosted across 1,000+ domains and 10,000+ IPs, affecting more than 20 major brands.| Silent Push
Infrastructure Laundering is a criminal practice of intermediaries enabling threat actors to hide infrastructure with major cloud providers.| Silent Push
Expose pre-weaponized adversary infrastructure with Indicators of Future Attack™.| Silent Push
Silent Push Threat Analysts have observed the FIN7 group (aka Sangria Tempest) using new tactics in their malware and phishing attacks, with the creation of at least seven websites serving malware to visitors looking to use an “AI Deepnude generator” and continued use of browser extension honeypots.| Silent Push
Silent Push are tracking a Russia-linked threat actor who is deploying crypto scam domains targeting the US election, and US tech brands.| Silent Push
Silent Push Threat Analysts have used content similarity scans to reveal 2,500+ unique IOFA domains and IPs hosting illegal pharmacy content.| Silent Push
Silent Push tracks 2,000+ domains and IPs affected by ClickFix fake browser update malware, using proprietary JavaScript scans.| Silent Push
Monitor the entire Internet daily for cyber threats and gain comprehensive insights into global internet infrastructure with Silent Push Community Edition.| Silent Push
Explore the Silent Push blog for in-depth perspectives and innovative insights on threat intelligence security. Search by post type and category today.| Silent Push
Silent Push threat analysts are currently tracking a campaign that uses fake websites and social engineering to serve a copy of the AnyDesk remote access software to Windows and macOS users, that is then being used to steal data and money once installed on a victim's machine. Brands targeted include UK banks HSBC, Natwest, Lloyds,| Silent Push - We Know First
In this blog, we’ll take you through how the Silent Push console and API outputs risk scores, and how to utilize scoring methodologies to level-up your threat intelligence operation. We'll explain how each score is calculated, including the different factors we take into account, and how to operationalize the data.| Silent Push - We Know First
Silent Push's forward and reverse passive DNS lookup functionality allows you to perform a deep dive into enriched intelligence datasets, interrogate zone data, map out malicious infrastructure and analyze attacker TTPs using a first-party dataset that is original, aggregated at source, and uniquely designed to create searchable spaces related to specific attack vectors.| Silent Push - We Know First
Live Scan allows you to extract real-time data from a single URL on the clearnet or darkweb, across a range of categories, and view historical scan results for the specified URL.| Silent Push - We Know First
This blog will take you through how to enrich domains or IPs in Silent Push, understand each enrichment category and get the most out of the enrichment feature by outlining useful functions such as pivoting and API capability.| Silent Push - We Know First
Think of threat feeds as a live weather reporting system, offering up new information that can help you prepare for a storm that is coming your way, or alerting you to one that is already circling overhead.| Silent Push - We Know First
Silent Push Analysts have used content scans to reverse-engineer FIN7 TTPs, and uncover phishing and browser extension malware infrastructure targeting the following organizations: Louvre Museum, Meta, Reuters, Microsoft 365, Wall Street Journal, Midjourney, CNN, Quickbooks, Alliant, Grammarly, Airtable, Webex, Lexis Nexis, Bloomberg, and Quicken.| Silent Push - Know First
Silent Push Threat Analysts have uncovered 24 DukeEugene MaaS control panels - including ERMAC, Hook, Loot, and Pegasus.| Silent Push
Indicators of Future Attack (IOFA) Feed data provides realtime, actionable intelligence for your existing security stack.| Silent Push