Latest threat research
Video
// Push Security is like EDR, but for your identities. //
Geoff Belknap
Deputy CISO at Microsoft
Former LinkedIn, Slack, Palantir
Stop advanced phishing attacks
Attackers are bypassing domain and email-based phishing controls. Push blocks phishing attacks by inspecting page contents and analyzing user behavior. Protect your users against:
AitM and BitM toolkits
Cloned login pages
SSO password theft
Prev
Next







Why security teams choose Push
Harness the power of browser telemetry and Push’s plug-and-play identity security controls.
Unique telemetry
Detect attacks that can’t be seen using other sources
Instant value
Get protection from Push’s pre-configured controls from day one
Seamless integration
Integrate Push with your SIEM, XDR, SOAR and compliance solutions
3 key takeaways from the Scattered Spider attacks on insurance and aviation firms
Scattered Spider continues to dominate the headlines, with attacks on U.S. insurance giant Aflac, Philadelphia Insurance Companies, and Erie Insurance.

Dan
Jun 30, 2025
// Read more
Scattered Spider: Understanding help desk scams and how to defend your organization
Scattered Spider has dominated the headlines in recent months with a consistent focus on help desk scams. Here's what you need to know to protect your business.

Dan
Jun 27, 2025
// Read more
App-Specific Password phishing: another novel way to get around passkeys and MFA
How App-Specific Password phishing is being used in the wild to bypass phishing-resistant authentication controls like passkeys.

Dan
Jun 26, 2025
// Read more