Webinar: How Computer-Using Agents Can Be Leveraged In Cyber Attacks
Looking back on identity attacks in 2024 and the evolution of attacker tooling and techniques.
Read the KuppingerCole 2024 “Rising Star: Push Security” report to find out why Push Security has been named a rising star in the emerging Identity Threat Detection and Response (ITDR) category.
How SaaS attacks evolved in 2024 and what we can expect to see more of in 2025.
In this guide on external phishing attacks via Slack, we'll show red teamers and pentesters how to get initial access as the first step in the attack kill chain.
How attackers are stealing your cookies and bypassing MFA.
Luke Jennings, VP R&D at Push Security, tears down popular AitM phishing kits to see what makes them so effective at getting through your defenses.
Phishing 2.0 – Detecting Evilginx, EvilnoVNC, Muraena and Modlishka
Snowflake: The tip of the iceberg – Three practical takeaways from the Snowflake incident.
Demonstrating ghost logins in Snowflake and how to remediate them.
The New SaaS Cyber Kill Chain: SO-CON 2024
Push CEO & co-founder Adam Bateman appeared on the RSnake show to discuss Push's browser-based ITDR product.
BlueHat 2023 - SaaS Cyber Kill Chain
Understanding the New SaaS Cyber Kill Chain
Shared Security - Compromising an Organization without Touching the Network
Pain in the SaaS
Push helped Convex Insurance enhance their identity security and gain control of shadow SaaS, closing a gap left by traditional CASB solutions.
Push helped Inductive find and secure shadow accounts and apps with high-fidelity data in a way that didn’t interfere with employees’ productivity.
Upvest partnered with Push to achieve a scalable and user-centric way to secure SaaS apps and reduce third-party risks across a complex ecosystem of integrations and apps.