Latest threat research
Video
// Push Security is like EDR, but for your identities. //
Geoff Belknap
Deputy CISO at Microsoft
Former LinkedIn, Slack, Palantir
Discover the power of in-browser identity protection
Why security teams choose Push
Harness the power of browser telemetry and Push’s plug-and-play identity security controls.
Unique telemetry
Detect attacks that can’t be seen using other sources
Instant value
Get protection from Push’s pre-configured controls from day one
Seamless integration
Integrate Push with your SIEM, XDR, SOAR and compliance solutions
Why it's time for phishing prevention to move beyond email
Modern MFA-bypass phishing attacks are routinely defeating primarily email-based security controls. Why are controls failing and what can we do about it?

Dan
Mar 20, 2025
// Read more
5 ways attackers can use Computer-Using Agents to automate identity attacks
We're back with part 2 of our research into OpenAI Operator to share our findings on how it can be used to automate identity attacks.

Luke
Mar 13, 2025
// Read more
How new AI agents will transform credential stuffing attacks
Credential stuffing attacks had a huge impact in 2024. But things could be dialled up even further with Computer-Using Agents like OpenAI Operator.

Dan
Mar 11, 2025
// Read more