Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsSilent Push Launches Traffic Origin to Expose the True Source of Obfuscated Web Traffic
Silent Push Launches Traffic Origin to Expose the True Source of Obfuscated Web Traffic
SaaSCybersecurity

Silent Push Launches Traffic Origin to Expose the True Source of Obfuscated Web Traffic

•January 22, 2026
0
SiliconANGLE
SiliconANGLE•Jan 22, 2026

Companies Mentioned

Silent Push

Silent Push

StepStone Group

StepStone Group

STEP

Ten Eleven

Ten Eleven

Why It Matters

Knowing the exact origin of concealed traffic lets organizations stop attacks before they materialize, reducing financial loss and regulatory risk. This capability addresses a critical blind spot in traditional defenses, especially against state‑sponsored and proxy‑based threat actors.

Key Takeaways

  • •Traffic Origin reveals true upstream source of obfuscated traffic
  • •Identifies VPN, proxy, Tor, residential proxies with country context
  • •Provides high‑confidence risk indicators for sanctioned regions
  • •Enables proactive mitigation of fraud, insider threats, AML
  • •Backed by $32M funding, investors include StepStone, Ten Eleven

Pulse Analysis

Obfuscated web traffic has become a staple of sophisticated threat actors, allowing them to mask malicious activity behind residential proxies, VPNs, or bot farms. Traditional security tools often stop at the edge, flagging suspicious IPs without insight into the underlying infrastructure, which creates a reactive posture that attackers can exploit. By exposing the true upstream origin, organizations gain a strategic advantage, turning a hidden attack vector into a visible, manageable risk.

Traffic Origin combines upstream routing analysis, IP‑reputation scoring, and host‑diversity metrics to deliver high‑confidence indicators about where traffic truly originates. The solution maps "Countries Connected" to each IP, flags traffic routed through sanctioned regions such as North Korea or Iran, and visualizes these relationships within Silent Push’s platform. Security teams can now prioritize high‑risk logins, vet remote workers, and strengthen Know‑Your‑Customer and Anti‑Money‑Laundering processes before credential theft or fraud occurs, effectively shifting from detection to prevention.

The launch arrives at a time when the cyber‑defense market is hungry for proactive tools, and Silent Push’s $32 million funding round signals strong investor belief in this approach. Competing vendors still focus on threat‑intel feeds and endpoint detection, leaving a gap that Traffic Origin aims to fill. As regulatory scrutiny intensifies and state‑backed actors refine proxy‑based evasion, the ability to attribute traffic to its true source could become a differentiator for enterprises seeking resilient, compliance‑ready security architectures.

Silent Push launches Traffic Origin to expose the true source of obfuscated web traffic

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...