UPCOMING WEBINAR ?? Infrastructure Laundering: How attackers are abusing mainstream hosting providers, and what to do about it. Register: https://hubs.ly/Q0369wQh0 ?? 6 March 2025 ?? 12pm ET (US/America), 12pm CET (Europe), 10am SGT (Asia Pacific) ?? Online - Zoom In our upcoming webinar, our Director of Threat Intelligence Kasey Best will break down how attackers are abusing mainstream hosting providers to evade detection and scale-up their operations. We'll take you through real-life examples of infrastructure laundering and what security teams can do to identify, track and mitigate this activity in real-time. Join us to gain a real edge against evolving threats with proven preemptive threat detection techniques and strategies. #webinar #cybersecurity #AWS #MicrosoftAzure #CTI #SOC #threatdetection
Silent Push
计算机和网络安全
Reston,Virginia 5,004 位关注者
Detect and protect against adversaries with Indicators of Future Attack.
关于我们
Silent Push provides preemptive cyber intelligence exposing threat actor infrastructure as it’s being set up. Our industry-leading Indicators of Future Attack (IOFA) act as an early warning system to defend against threats. We go beyond stale IOCs and create a unique digital fingerprint of adversary behavior enabling you to proactively block hidden attacks before they’re launched.
- 网站
-
https://www.silentpush.com
Silent Push的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 51-200 人
- 总部
- Reston,Virginia
- 类型
- 私人持股
- 创立
- 2020
- 领域
- Threat Intelligence、Cyber Security、Network Defense、Threat Feeds和Ransomware
地点
-
主要
12020 Sunrise Valley Dr
Suite 100
US,Virginia,Reston,20191
Silent Push员工
动态
-
?? Warning: Lazarus Group Expanding Targeting in Crypto Industry We've updated our Lazarus blog with new intelligence: threat actors are not only targeting major crypto companies but also their prospective hires. These organizations have been mentioned in logs linked to recent activity, signaling potential risk. Companies on the list include: Stripe, Coinbase, Binance, Kraken, Ripple, Robinhood, Circle, Polygon Labs, Bondex, Block, Ripple, Tether, Gemini, Chainalysis, KuCoin Exchange, eToro, Bitstamp, Bitfinex, Gate.io, Pantera Capital, Galaxy, Bitwise Inc Asset Management, Bitwise Inc Investments, BingX, Nethermind, Gauntlet, XY Labs, YouHodler, Matchain, BEMO, Barrow Wise Consulting, LLC, Bondex, Halliday, Holidu, Hyphen Connect, and Windranger Labs. #lazarus #apt #northkorea #crypto #cyberattack #CTI #threatintel #cybersecurity
-
-
?? NEW THREAT REPORT ?? Astrill VPN: Silent Push publicly releases new IPs on VPN service heavily used by North Korean threat actors. Read: https://hubs.ly/Q038Y0VZ0 Our analysts have constructed a series of Silent Push IOFA Feeds that provide a growing list of Indicators of Future Attack focused on scams supported by this technique as well as on North Korean APT groups, which are all available to Enterprise customers. #Astrill #VPN #cyberattack #NorthKorea #threatintelligence #IOFA #CTI
-
-
Silent Push转发了
Are You Hiring Remote IT Workers? You Might Be Interviewing a North Korean Hacker North Korean threat actors have been known to disguise themselves through fake identities and apply for fully remote IT jobs to infiltrate companies. At Silent Push, we recently publicly released new IPs associated with Astrill VPN, a service heavily used by North Korean threat actors. See the full blog here: https://lnkd.in/et8RMztU
-
??? Quick tip for hunting Lumma Stealer domains by checking WHOIS Records in Silent Push Lumma actors often create C2 domains in (likely automated) batches, which means you’ll find clusters of domains with extremely similar registration times. This is a key pattern you can use to your advantage when hunting for these domains. ?? Use a Silent Push WHOIS search to quickly identify these clusters and uncover potential threats. ?? Oh, and you can do this using our FREE Community Edition. Register today and start detecting IOFAs: https://hubs.ly/Q038L22F0 #indicatorsoffutureattack #IOFAs #lummastealer #C2 #cyberattack #cybersecurity
-
North Korean APT group Lazarus has just pulled off the biggest crypto heist in history ?? But hours before the $1.4 billion Bybit heist, Silent Push analysts detected them registering bybit-assessment[.]com – a domain linked to an email used in previous Lazarus attacks... From there, our team discovered 27 unique Astrill VPN IP addresses in the logs linked to test records created by Lazarus members while configuring their setup. ?? Full investigation and sample list of Indicators of Future Attack (IOFAs): https://hubs.ly/Q038yG7F0 Got info to share? Questions about our methods? Reach out or share this with those at risk. #lazarus #APT #cybersecurity #threatdetection #infosec
-
Silent Push转发了
Tune into the Front Lines Category Visionaries podcast to hear Ken B., CEO and founder of portfolio company, Silent Push discuss the company’s success as well as topics such as: ?? Building a complex data collection and behavioral analytics platform ?? Leveraging research and expertise to drive brand awareness ?? Geographic expansion challenges and opportunities Shout out to Brett Stapper for the insightful conversation, and for featuring Ken as a guest! Listen to the full episode below ??
Ken B. has built and sold two cybersecurity companies. His latest, Silent Push, just landed 50% of Global Fortune 50 companies in 18 months. Here's how they did it: In his first startup, Ken made a classic mistake: selling sophisticated email security through MSPs to SMBs who couldn't appreciate its value. After selling to FireEye, he discovered something counterintuitive - enterprise customers were actually easier to sell to. They understood and valued technical innovation. This insight shaped Silent Push's entire approach: Instead of rushing to market, they spent 3 years building their platform to monitor all changes on the Internet daily. They became one of the most aggressive data collectors globally. Their GTM strategy? "Shout loudly in a small room." They identified tight-knit threat intelligence communities within industry verticals and positioned themselves as experts. No broad marketing campaigns. No sales to CISOs directly. They launched a free community product - but with a twist: → Required user authentication → Monitored usage patterns → Identified sophisticated users → Actively nurtured promising accounts One day, the "largest company in the world" reached out. They'd been using Silent Push's free product for 6 months. Their first meeting had 13 people who already knew everything about the product. Ken's most surprising insight? "It is just as easy to sell to the largest company in the world as the smallest." They're now expanding globally, but with a clear lesson: start in markets open to innovation (like the US) before tackling relationship-dependent regions. Listen to the full episode to learn how Silent Push is transforming threat intelligence while building an enterprise sales machine here: https://lnkd.in/ehABA_M3
-
-
?? Silent Push has pivoted into new Lazarus APT infrastructure, acquiring sensitive intel related to $1.4B ByBit hack and past attacks. ?? Read the full investigation: https://hubs.ly/Q038qqxj0 The Lazarus Group, a North Korean state-sponsored cyber threat linked to the Reconnaissance General Bureau, has been active since 2009. Often used as a catch-all for other North Korean cyber units like APT37, APT38, Andariel, and Kimsuky, their activities remain widespread. Following the ByBit crypto heist, the largest in history, our team uncovered even more hidden infrastructure linked to their operations. Don’t miss these critical new findings. #LazarusAPT #NorthKorea #cyberattack #ByBit #cybersecurity #threatintelligence
-