Latest threat research
Video
// Push Security is like EDR, but for your identities. //
Geoff Belknap
Deputy CISO at Microsoft
Former LinkedIn, Slack, Palantir
Discover the power of in-browser identity protection
Why security teams choose Push
Harness the power of browser telemetry and Push’s plug-and-play identity security controls.
Unique telemetry
Detect attacks that can’t be seen using other sources
Instant value
Get protection from Push’s pre-configured controls from day one
Seamless integration
Integrate Push with your SIEM, XDR, SOAR and compliance solutions
How consent phishing is evolving to defeat detection controls
Consent phishing is where attackers trick users into authorizing access for malicious OAuth apps. Here's how attackers are using this technique in the wild.

Dan
Mar 31, 2025
// Read more
Dissecting a recent MailChimp phishing attack
HIBP creator and well-known security person Troy Hunt recently blogged about a phish he fell for. Here’s what it tells us about how phishing is evolving.

Dan
Mar 28, 2025
// Read more
Introducing Push password enforcement — for when weak passwords are still plaguing you
Detects when employees have weak, reused, or stolen passwords and guide them to update their password using in-browser messaging on any app.

Kelly
Mar 25, 2025
// Read more