logo
Silent Push Launches Chrome Extension, Providing New Controls and Quick Access to Critical Data to Preemptively Stop Attacks

Silent Push Launches Chrome Extension, Providing New Controls and Quick Access to Critical Data to Preemptively Stop Attacks

Korea Herald22-05-2025

New, strategic integration partnerships available that enhance capabilities and empower SOC, IR and CTI teams
SINGAPORE, May 22, 2025 /PRNewswire/ -- Silent Push, a leading preemptive cybersecurity intelligence company, announced today the launch of its new Google Chrome Extension, providing immediate access to information about indicators discovered through a user's browser and new controls to action on them.
As part of the company's continuing efforts to level up security teams' cyber defenses, Silent Push introduces new integration partner Filigran - the developer of OpenCTI. Silent Push partnerships, including ThreatConnect continue to improve the customer experience and enhance company-wide security stacks with enriched data from the Silent Push platform.
Simone Filiaggi, Sr. Threat Intelligence Analyst at Box, said: "The Silent Push Chrome Extension makes it a lot easier to access actionable, and high-quality threat intelligence. It's easy to use and improves our ability to detect and respond to threats including quick pivots into the Silent Push platform for a deep dive into adversary infrastructure."
Ken Bagnall, CEO and Co-Founder of Silent Push, said: "We are committed to providing our customers with the solutions and resources they need to protect themselves from an attack and maintain business resilience.
"Our Chrome Extension is bidirectional and makes it easier and faster to action. It acts as an integration into any of your SaaS platforms. By working directly in your browser through our extension, security teams now have the power to pivot control anywhere on the Internet. Through our integration partnerships and upcoming Abuse Reporting service, we are strengthening our capabilities and commitment so that security teams have the resources they need to identify adversary infrastructure before an attack is launched," Ken Bagnall said.
Jan Johansen, SVP Global Alliances, Filigran, the developer of OpenCTI said: "As a new integration partner, our joint customers will benefit from our better together offering of leading threat intelligence from Silent Push leveraged through our OpenCTI platform featuring comprehensive visualizations and analytic tools. This is the best of both worlds to fully enable security teams to protect their organization."
Andrew Pendargast, Chief Product Officer, ThreatConnect, said: "Our long-standing integration partnership with Silent Push enables our joint customers to further their journey towards a fully threat and risk-informed cyber defense. The new Chrome Extension, which offers defenders a far faster time to detect emerging threats, is a great example of the innovation the industry has come to expect from Silent Push."
Traditional IOC-based security models are such a reactive approach that limit security teams from proactively stopping an attack that is yet to launch. Attackers are faster, more automated and increasingly leverage modern techniques to evade detection. A more modern approach is needed.
Indicators of Future Attack (IOFA)™– only available from Silent Push–replace the traditional model providing an cyber early warning system. And, now with its Chrome Extension, Silent Push empowers Incident Response, Threat Intelligence and SOC teams to swiftly act and protect their organization with preemptive technology accessible with a simple click.
Currently, the Silent Push Chrome Extension is available to enterprise customers only and downloaded here within the Chrome Web Store.
About Silent Push
Silent Push is a preemptive cybersecurity intelligence company. It is the first and only solution to provide a complete view of emerging threat infrastructure in real-time, exposing malicious intent through its Indicators Of Future Attack™ (IOFA™) data to enable security teams to proactively block hidden threats and avoid loss. The Silent Push standalone platform is also available via API integrating with any number of security tools, including SIEM & XDR, SOAR, TIP, and OSINT providing automated enrichment and actionable intelligence. Customers include some of the world's largest enterprises within the Fortune 500 and government agencies. Free community edition www.silentpush.com LinkedIn and X.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

New Research Reveals Marketing Leaders See Strong Potential in gTLDs Despite Knowledge Gap
New Research Reveals Marketing Leaders See Strong Potential in gTLDs Despite Knowledge Gap

Korea Herald

time23-05-2025

  • Korea Herald

New Research Reveals Marketing Leaders See Strong Potential in gTLDs Despite Knowledge Gap

Global survey finds 92% of marketers recognize opportunities delivered by generic top-level domains, but cost and awareness barriers remain ahead of 2026 application window LOS ANGELES, May 20, 2025 /PRNewswire/ -- A new global survey from the Internet Corporation for Assigned Names and Numbers (ICANN) reveals that 52% of marketing leaders believe generic top-level domains (gTLDs – the three characters or more that come after the dot in a URL) have strong potential for enhancing brand presence online; however, a knowledge gap is preventing many brands from taking advantage of the opportunities that a gTLD can bring. The research surveyed over 2,000 marketing leaders across eight countries (Brazil, China, India, Mexico, Nigeria, South Africa, U.K., and U.S.) with the purpose of creating a picture of the evolving digital marketing landscape and understanding the levels of awareness around gTLDs. It comes as ICANN prepares to open the next application window for new gTLDs in April 2026 – the New gTLD Program: Next Round – the first opportunity in more than a decade for organizations to apply to operate their own gTLD. Top-level domains are the letters found at the end of an Internet address (with gTLDs including .ceo, .charity, .menu, and .paris). Brands can apply to run their own gTLD as a way to indicate the purpose of their organization or to clearly mark a website as being related to their brand. The research shows that increasing brand awareness and visibility is the top priority for marketing leaders (54%) and that over half believe that gTLDs have strong potential for enhancing brand presence online. However, the research also shows that almost a third (32%) of marketing leaders surveyed are unfamiliar with gTLDs, which suggests that operating a new gTLD may be a strategic opportunity that many organizations are currently overlooking. Key findings from the research include: The findings come at a time when marketing leaders are facing significant challenges in standing out from competitors (53%), attracting and engaging the right audience (52%), and keeping pace with digital trends (47%). A new gTLD can be an innovative tool for commerce and communication. They allow businesses in specific countries, sectors, or niche markets to create an exclusive, descriptive, and memorable label on the Internet. An entity operating a gTLD can provide its users and customers with an extra measure of confidence in its security and legitimacy online. This can be valuable in today's environment, where users often don't know whether they can trust the source on the Internet. Theresa Swinehart, SVP, Global Domains & Strategy said: "The New gTLD Program: Next Round presents an opportunity for businesses, communities, governments, and others to apply to operate their own secure space online, tailored to fit their organization, community, culture, language, and customer interests. Now is also the moment for brands to consider applying for a gTLD, and this research tells us there is still a lack of awareness. ICANN can help provide information and raise awareness of the Next Round and the opportunity it presents for global communities, organizations, and businesses, including brands." To help address the knowledge gap, ICANN is developing resources to help organizations understand the application process and potential opportunities for gTLDs ahead of the 2026 application window. ICANN also offers the Applicant Support Program (ASP), which provides financial and non-financial assistance to eligible applicants. The full report, "Understanding the gTLD Opportunity for Brands," is available at For more information on the New gTLD Program visit About ICANN ICANN's mission is to help ensure a stable, secure, and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world. ICANN was formed in 1998 as a nonprofit public benefit corporation with a community of participants from all over the world. About the survey This research was carried out by Focaldata on behalf of ICANN, with fieldwork conducted in March 2025. 2,000 marketing decision makers were surveyed, including Marketing Managers/Directors, CMOs, Heads of Marketing and other marketing-related roles. The research gathered a global perspective, including marketing decision makers across Brazil (161), China (165), India (350), Mexico (170), Nigeria (351), South Africa (156), U.K. (364), and U.S. (353).

Silent Push Launches Chrome Extension, Providing New Controls and Quick Access to Critical Data to Preemptively Stop Attacks
Silent Push Launches Chrome Extension, Providing New Controls and Quick Access to Critical Data to Preemptively Stop Attacks

Korea Herald

time22-05-2025

  • Korea Herald

Silent Push Launches Chrome Extension, Providing New Controls and Quick Access to Critical Data to Preemptively Stop Attacks

New, strategic integration partnerships available that enhance capabilities and empower SOC, IR and CTI teams SINGAPORE, May 22, 2025 /PRNewswire/ -- Silent Push, a leading preemptive cybersecurity intelligence company, announced today the launch of its new Google Chrome Extension, providing immediate access to information about indicators discovered through a user's browser and new controls to action on them. As part of the company's continuing efforts to level up security teams' cyber defenses, Silent Push introduces new integration partner Filigran - the developer of OpenCTI. Silent Push partnerships, including ThreatConnect continue to improve the customer experience and enhance company-wide security stacks with enriched data from the Silent Push platform. Simone Filiaggi, Sr. Threat Intelligence Analyst at Box, said: "The Silent Push Chrome Extension makes it a lot easier to access actionable, and high-quality threat intelligence. It's easy to use and improves our ability to detect and respond to threats including quick pivots into the Silent Push platform for a deep dive into adversary infrastructure." Ken Bagnall, CEO and Co-Founder of Silent Push, said: "We are committed to providing our customers with the solutions and resources they need to protect themselves from an attack and maintain business resilience. "Our Chrome Extension is bidirectional and makes it easier and faster to action. It acts as an integration into any of your SaaS platforms. By working directly in your browser through our extension, security teams now have the power to pivot control anywhere on the Internet. Through our integration partnerships and upcoming Abuse Reporting service, we are strengthening our capabilities and commitment so that security teams have the resources they need to identify adversary infrastructure before an attack is launched," Ken Bagnall said. Jan Johansen, SVP Global Alliances, Filigran, the developer of OpenCTI said: "As a new integration partner, our joint customers will benefit from our better together offering of leading threat intelligence from Silent Push leveraged through our OpenCTI platform featuring comprehensive visualizations and analytic tools. This is the best of both worlds to fully enable security teams to protect their organization." Andrew Pendargast, Chief Product Officer, ThreatConnect, said: "Our long-standing integration partnership with Silent Push enables our joint customers to further their journey towards a fully threat and risk-informed cyber defense. The new Chrome Extension, which offers defenders a far faster time to detect emerging threats, is a great example of the innovation the industry has come to expect from Silent Push." Traditional IOC-based security models are such a reactive approach that limit security teams from proactively stopping an attack that is yet to launch. Attackers are faster, more automated and increasingly leverage modern techniques to evade detection. A more modern approach is needed. Indicators of Future Attack (IOFA)™– only available from Silent Push–replace the traditional model providing an cyber early warning system. And, now with its Chrome Extension, Silent Push empowers Incident Response, Threat Intelligence and SOC teams to swiftly act and protect their organization with preemptive technology accessible with a simple click. Currently, the Silent Push Chrome Extension is available to enterprise customers only and downloaded here within the Chrome Web Store. About Silent Push Silent Push is a preemptive cybersecurity intelligence company. It is the first and only solution to provide a complete view of emerging threat infrastructure in real-time, exposing malicious intent through its Indicators Of Future Attack™ (IOFA™) data to enable security teams to proactively block hidden threats and avoid loss. The Silent Push standalone platform is also available via API integrating with any number of security tools, including SIEM & XDR, SOAR, TIP, and OSINT providing automated enrichment and actionable intelligence. Customers include some of the world's largest enterprises within the Fortune 500 and government agencies. Free community edition LinkedIn and X.

Nearly 27 million mobile fingerprints leaked in SK Telecom data breach: ministry
Nearly 27 million mobile fingerprints leaked in SK Telecom data breach: ministry

Korea Herald

time19-05-2025

  • Korea Herald

Nearly 27 million mobile fingerprints leaked in SK Telecom data breach: ministry

Malware attack began in June 2022, officials say A joint team of public and private investigators found that nearly 27 million units of international mobile subscriber identity, or IMSI, have been leaked from SK Telecom's data breach, the Ministry of Science and ICT said Monday. 'The investigators confirmed that the amount of leaked (universal subscriber identity module, or USIM) information was 9.82 (gigabytes), which equals to about 26.69 million units of the IMSI,' said Choi Woo-hyuk, director general of the Cyber Security & Network Policy Bureau at the Science Ministry, in a press briefing to announce the interim findings of the probe at the Government Complex Seoul. IMSI, which can be regarded as a mobile fingerprint, is a 15-digit or shorter number used to identify and authenticate each mobile subscriber on a cellular network. As for SK Telecom's 25 million subscribers being smaller than the number of leaked IMSIs, the officials explained that the number of IMSIs combines all universal subscriber identity modules, or USIMs, loaded onto not only smartphones but also smart watches and other connected devices using the Internet. The authorities announced that they found 25 types of malware and 23 hacked servers so far, up 21 and 18, respectively, from the previous discoveries released by the joint investigation on April 29. Having completed the investigation of 15 servers through detailed assessments, such as forensic and log analysis, the authorities plan to finish the investigation of the remaining eight servers by the end of May. According to the investigators, the first malware was found to have been installed on June 15, 2022. They added that no data was leaked between Dec. 2, 2024, and April 24, 2025. However, they could not confirm whether any data was leaked between June 15, 2022, and Dec. 2, 2024, a period without firewall log history. Regarding the concerns over possible damages from copy phones, whether the information of international mobile equipment identity, or IMEI, a 15-digit serial number assigned to every mobile phone, was leaked or not drew serious worries among the public. Unlike the government's previous announcement in April, the authorities confirmed during Monday's briefing that they found a hacked server containing 291,831 units of IMEI. According to investigators, there were no damage reports regarding the data breach at the country's biggest telecom carrier yet. They added that phone makers say making copy phones just using the IMEI information is technically impossible. 'Given the types of malware and the methods used in this attack, it is clear that a far more sophisticated level of analysis and efforts are needed compared to what we've seen before,' said Ryu Je-myung, deputy minister of the Office of Network Policy. "That is why we are conducting this investigation with the utmost intensity, based on the judgment that unless we uncover every potential risk thoroughly, there could be even greater threats in the future."

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store