Silent Push Launches Version 4.11 to Enhance Enterprise Threat Hunting Experience

New features, integrations, and updates simplify search, improve usability, and provide enterprise client benefits

Reston, VA, November 13, 2025Silent Push, a leading preemptive cybersecurity vendor, today announced the release of version 4.11 of its enterprise preemptive defense platform. The latest update continues the company’s mission to give defenders the advantage by revealing attacker infrastructure before threats can take hold.

Version 4.11 introduces a range of new capabilities designed to streamline how analysts search, investigate, and act on emerging intelligence. The release enhances the platform’s core search functionality, simplifies workflows, and introduces new integrations and updates to help enterprise users better identify specific risks that traditional scans may miss.


“Version 4.11 builds on our ongoing commitment to enhancing the analyst experience while expanding the depth and precision of threat discovery,” said Ken Bagnall, CEO and Co-Founder at Silent Push. “We’ve focused this release on giving users faster navigation, greater scanning flexibility, and more in-depth insights, to detect malicious intent earlier in the attack lifecycle.”


Key Updates in Version 4.11 Include:

  • Streamlined Automations: Streamlined save, monitor, and export processes into a single view, which will make for easier creation and management of queries and automations. Users can now edit existing monitors and have granular control over what data gets exported.
  • Customized Notifications: Users can now customize notifications for each monitor according to their personal preferences, and receive notifications in app, via email, or their preferred messaging platform, including Slack and Teams.
  • More Powerful Searches: Deployment of an updated version of the Silent Push Query Language (SPQL) API, with improved asynchronous processing, will provide enhanced support for long-running queries.
  • Integrations: Splunk and D3; Plus, Updated Chrome Extension  
    • Splunk 3.0 is the latest big data platform integration. It includes Silent Push ThreatCheck support and provides multiple enterprise client benefits.
      • Splunk users often process millions of events per day, and running enrichment checks against every indicator (IP address, domain, URL, etc.) can become costly. With ThreatCheck, enterprise users can run indicators they have in Splunk through ThreatCheck to detect when Indicators Of Future Attack™ (IOFA™) have touched their environments at scale, without consuming usage credits. New dashboards enable deeper analysis of how and where threat actors manage their infrastructure.  
      • Additionally, users can now create and manage feeds from within the Splunk app, facilitating bidirectional workflows.
    • The Chrome Extension 1.0.7 update helps enterprise users prioritize investigations more effectively by quickly checking any indicators referenced on a web page to see if they are on our IOFA™ feeds.
      • The new version enables automatic query generation from selected indicators to provide additional context from across all of Silent Push’s data sources. 

Additional updates in version 4.11 include updated UX for search results tables to accommodate new data sources; expanded indicator history listings for IOFA™ feeds; and additional pivot controls for Total View and WHOIS data for faster, more intuitive platform navigation.

Get in Touch

Have any questions about the new release, or interested in learning more about our Community and Enterprise Editions? Get in touch today, and we’ll get back to you shortly.