[{"data":1,"prerenderedAt":3953},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":36,"navbar-about-highlight":100,"navbar-resource-highlight":174,"use-case-page":220,"fa-icon-regular-faFishingRod":1242,"fa-icon-regular-faPuzzlePiece":1246,"fa-icon-regular-faUserSecret":1248,"fa-icon-regular-faRadar":1250,"fa-icon-regular-faLaptopCode":1252,"fa-icon-regular-faSatelliteDish":1254,"fa-icon-regular-faShieldCheck":1256,"fa-icon-regular-faBrainCircuit":1258,"blog/verizon-dbir-2026-review":1260},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"query":14,"data":15,"variations":20,"lastUpdated":21,"firstPublished":22,"testRatio":23,"createdBy":24,"lastUpdatedBy":25,"folders":26,"meta":27,"rev":35},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner","1c6207a5f24948ab82d4a0b17f251193","published",[],{"type":16,"url":17,"text":18,"link":19},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,1,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2","jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":28,"lastPreviewUrl":29,"breakpoints":30,"hasAutosaves":34},"data","",{"xsmall":31,"small":32,"medium":33},320,640,768,true,"s1c7pgdjdp",{"createdDate":37,"id":38,"name":39,"modelId":40,"published":13,"stageModifiedSincePublish":6,"query":41,"data":42,"variations":89,"lastUpdated":90,"firstPublished":91,"testRatio":23,"createdBy":92,"lastUpdatedBy":93,"folders":94,"meta":95,"rev":99},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"url":29,"ctaText":43,"text":44,"blocks":45,"state":85},"ewrererw","testrfesssssssssss",[46,73],{"@type":47,"@version":48,"id":49,"component":50,"responsiveStyles":63},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":51,"tag":51,"options":52,"isRSC":62},"TopBannerContent",{"text":53,"ctaText":54,"url":55,"mainText":56,"cta":59},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks","Save Your Spot","https://pushsecurity.com/webinar/state-of-browser-security",{"content":57,"fontSize":58},"\u003Cp>Is your stack covered? 51 browser &amp; identity attacks, mapped.\u003C/p>","text-base",{"content":60,"fontSize":58,"url":61},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">See the matrix →\u003C/strong>\u003C/p>\n","https://pushsecurity.com/resources/browser-identity-attacks-matrix/",null,{"large":64},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"marginTop":70,"marginBottom":70,"fontSize":71,"fontWeight":72},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":74,"@type":47,"tagName":75,"properties":76,"responsiveStyles":80},"builder-pixel-w799xxl0fjq","img",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":81},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},"block","hidden","none",{"deviceSize":86,"location":87},"large",{"path":29,"query":88},{},{},1778612252607,1774968080803,"ST0tXQM8slWpFrmioqKHmENB2qe2","ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"kind":96,"hasLinks":6,"breakpoints":97,"lastPreviewUrl":98,"hasAutosaves":34,"hasErrors":6},"component",{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","vu2mk17whmi",[101,137],{"createdDate":102,"id":103,"name":104,"modelId":105,"published":13,"stageModifiedSincePublish":6,"query":106,"data":107,"variations":130,"lastUpdated":131,"firstPublished":132,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":133,"meta":134,"rev":136},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":108,"type":109,"testimonialLink":110,"testimonial":111},{},"testimonial","/customer-stories/inductive-automation",{"@type":112,"id":113,"model":109,"value":114},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79",{"query":115,"folders":116,"createdDate":117,"id":113,"name":118,"modelId":119,"published":13,"data":120,"variations":124,"lastUpdated":125,"firstPublished":126,"testRatio":23,"createdBy":92,"lastUpdatedBy":92,"meta":127,"rev":129},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":121,"jobTitle":122,"quote":118,"image":123},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,{"kind":28,"lastPreviewUrl":29,"breakpoints":128,"hasAutosaves":34},{"small":32,"medium":33},"qh8twjddz8c",{},1776247404986,1776247404973,[],{"breakpoints":135,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"c8kt84dz6r8",{"createdDate":138,"id":139,"name":140,"modelId":105,"published":13,"meta":141,"stageModifiedSincePublish":6,"query":143,"data":144,"variations":170,"lastUpdated":171,"firstPublished":172,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":173,"rev":136},1776255761419,"05a9322735fc427db12e2740e4302300","Report: 2026 Browser Attack Techniques",{"breakpoints":142,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[],{"testimonial":145,"link":164,"type":167,"title":140,"description":168,"image":169},{"@type":112,"id":146,"model":109,"value":147},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":148,"folders":149,"createdDate":150,"id":146,"name":151,"modelId":119,"published":13,"data":152,"variations":158,"lastUpdated":159,"firstPublished":160,"testRatio":23,"createdBy":92,"lastUpdatedBy":24,"meta":161,"rev":163},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":153,"jobTitle":154,"author":155,"qoute":29,"quote":156,"image":157},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":28,"lastPreviewUrl":29,"breakpoints":162,"hasAutosaves":34},{"small":32,"medium":33},"hpzw65sp5k",{"text":165,"url":166},"Download now","/resources/browser-attacks-report","resource","Learn about the latest techniques being used in the wild.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9",{},1776255810913,1776255810900,[],[175,198],{"createdDate":176,"id":177,"name":140,"modelId":178,"published":13,"meta":179,"stageModifiedSincePublish":6,"query":181,"data":182,"variations":193,"lastUpdated":194,"firstPublished":195,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":196,"rev":197},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":180,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[],{"testimonial":183,"link":192,"type":167,"title":140,"description":168,"image":169},{"@type":112,"id":146,"model":109,"value":184},{"query":185,"folders":186,"createdDate":150,"id":146,"name":151,"modelId":119,"published":13,"data":187,"variations":188,"lastUpdated":159,"firstPublished":160,"testRatio":23,"createdBy":92,"lastUpdatedBy":24,"meta":189,"rev":191},[],[],{"video":153,"jobTitle":154,"author":155,"qoute":29,"quote":156,"image":157},{},{"kind":28,"lastPreviewUrl":29,"breakpoints":190,"hasAutosaves":34},{"small":32,"medium":33},"xw6i3jox3xh",{"text":165,"url":166},{},1776256937553,1776256937540,[],"x0ak99wy5v",{"createdDate":199,"id":200,"name":201,"modelId":178,"published":13,"stageModifiedSincePublish":6,"query":202,"data":203,"variations":214,"lastUpdated":215,"firstPublished":216,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":217,"meta":218,"rev":197},1776256949234,"ce043785b71b4ece98eac811ecf4ba10","inductive-automation",[],{"link":204,"type":109,"testimonial":205,"testimonialLink":110},{},{"@type":112,"id":113,"model":109,"value":206},{"query":207,"folders":208,"createdDate":117,"id":113,"name":118,"modelId":119,"published":13,"data":209,"variations":210,"lastUpdated":125,"firstPublished":126,"testRatio":23,"createdBy":92,"lastUpdatedBy":92,"meta":211,"rev":213},[],[],{"author":121,"jobTitle":122,"quote":118,"image":123},{},{"kind":28,"lastPreviewUrl":29,"breakpoints":212,"hasAutosaves":34},{"small":32,"medium":33},"sec3hxobj4",{},1776256974140,1776256974130,[],{"breakpoints":219,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[221,405,524,643,761,881,1001,1121],{"createdDate":222,"id":223,"name":224,"modelId":225,"published":13,"stageModifiedSincePublish":6,"query":226,"data":232,"variations":393,"lastUpdated":394,"firstPublished":395,"testRatio":23,"screenshot":396,"createdBy":92,"lastUpdatedBy":397,"folders":398,"meta":399,"rev":404},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[227],{"@type":228,"property":229,"operator":230,"value":231},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":233,"customFonts":234,"seoTitle":282,"title":282,"tsCode":29,"seoDescription":283,"fontAwesomeIcon":284,"jsCode":29,"blocks":285,"url":231,"state":390},[],[235],{"family":236,"kind":237,"version":238,"lastModified":239,"files":240,"category":259,"menu":260,"subsets":261,"variants":264},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"800italic":249,"900italic":250,"700italic":251,"100italic":252,"italic":253,"regular":254,"200italic":255,"500italic":256,"300italic":257,"600italic":258},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[262,263],"latin","latin-ext",[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[286,385],{"@type":47,"@version":48,"tagName":287,"id":288,"children":289},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[290,307,315,322,334,349,360,371,377],{"@type":47,"@version":48,"layerName":291,"id":292,"component":293,"responsiveStyles":304},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":291,"options":294,"isRSC":62},{"title":282,"description":295,"points":296,"video":303},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[297,299,301],{"item":298},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":300},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":302},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":305},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},"transparent",{"@type":47,"@version":48,"id":308,"component":309,"responsiveStyles":312},"builder-96634044407e491299e291ed64669e39",{"name":310,"options":311,"isRSC":62},"TrustedBy",{"AllPartners":34,"backgroundTransparent":6},{"large":313},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},"#000",{"@type":47,"@version":48,"id":316,"component":317,"responsiveStyles":320},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":318,"options":319,"isRSC":62},"Diagonal",{"darkMode":34},{"large":321},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"layerName":323,"id":324,"component":325,"responsiveStyles":332},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":323,"tag":323,"options":326,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":329,"description":330,"animatedTitle":29,"image":331,"reverse":6,"descriptionPaddingHorizontal":62},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":333},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":335,"component":336,"responsiveStyles":344},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":337,"options":338,"isRSC":62},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":341,"description":342,"reverse":34,"image":343},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":345},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":347,"marginTop":348},"DM Sans, sans-serif","20px","0px",{"@type":47,"@version":48,"id":350,"component":351,"responsiveStyles":357},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":337,"options":352,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":354,"description":355,"reverse":6,"image":356},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":358},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},"36px",{"@type":47,"@version":48,"layerName":337,"id":361,"component":362,"responsiveStyles":368},"builder-42c32198083f4880acb37c5cb76934da",{"name":337,"options":363,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":365,"description":366,"reverse":34,"image":367},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":369},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},"47px",{"@type":47,"@version":48,"id":372,"component":373,"responsiveStyles":375},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":318,"options":374,"isRSC":62},{"darkMode":6},{"large":376},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":378,"component":379,"responsiveStyles":383},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":380,"tag":380,"options":381,"isRSC":62},"LatestResources",{"sectionHeading":29,"customClass":382},"bg-black",{"large":384},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":386,"@type":47,"tagName":75,"properties":387,"responsiveStyles":388},"builder-pixel-azfyy7alwzh",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":389},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":391},{"path":29,"query":392},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":400,"winningTest":62,"breakpoints":401,"kind":402,"hasLinks":6,"originalContentId":403,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},"page","2daa5670b8504fc7ba4700633e8bd921","p7xxdc7e2lb",{"createdDate":406,"id":407,"name":408,"modelId":225,"published":13,"stageModifiedSincePublish":6,"query":409,"data":412,"variations":516,"lastUpdated":517,"firstPublished":518,"testRatio":23,"screenshot":519,"createdBy":92,"lastUpdatedBy":397,"folders":520,"meta":521,"rev":404},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[410],{"@type":228,"property":229,"operator":230,"value":411},"/uc/browser-extension-security",{"seoDescription":413,"jsCode":29,"fontAwesomeIcon":414,"tsCode":29,"title":408,"seoTitle":408,"customFonts":415,"inputs":420,"blocks":421,"url":411,"state":513},"Shine a light on risky browser extensions.","faPuzzlePiece",[416],{"kind":237,"family":236,"version":238,"files":417,"category":259,"lastModified":239,"subsets":418,"variants":419,"menu":260},{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"100italic":252,"italic":253,"regular":254,"900italic":250,"800italic":249,"700italic":251,"200italic":255,"300italic":257,"500italic":256,"600italic":258},[262,263],[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],[],[422,508],{"@type":47,"@version":48,"tagName":287,"id":423,"meta":424,"children":425},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":288},[426,442,449,456,465,475,485,495,502],{"@type":47,"@version":48,"id":427,"meta":428,"component":429,"responsiveStyles":440},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":292},{"name":291,"options":430,"isRSC":62},{"title":408,"description":431,"points":432,"video":439},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[433,435,437],{"item":434},"Discover every browser extension in use",{"item":436},"Spot risky or unsanctioned behavior",{"item":438},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":441},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":443,"meta":444,"component":445,"responsiveStyles":447},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":308},{"name":310,"options":446,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":448},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":450,"meta":451,"component":452,"responsiveStyles":454},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":316},{"name":318,"options":453,"isRSC":62},{"darkMode":34},{"large":455},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"layerName":323,"id":457,"component":458,"responsiveStyles":463},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":323,"tag":323,"options":459,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":460,"description":461,"image":462,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":464},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":466,"meta":467,"component":468,"responsiveStyles":473},"builder-93738f98109a4009affb349afd7bb182",{"previousId":335},{"name":337,"options":469,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":470,"description":471,"reverse":34,"image":472},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":474},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":347,"marginTop":348},{"@type":47,"@version":48,"id":476,"meta":477,"component":478,"responsiveStyles":483},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":350},{"name":337,"options":479,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":480,"description":481,"reverse":6,"image":482},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":484},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":486,"meta":487,"component":488,"responsiveStyles":493},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":361},{"name":337,"options":489,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":490,"description":491,"reverse":34,"image":492},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":494},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":496,"meta":497,"component":498,"responsiveStyles":500},"builder-1a689287d1a1418997d57db578a71105",{"previousId":372},{"name":318,"options":499,"isRSC":62},{"darkMode":6},{"large":501},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":503,"component":504,"responsiveStyles":506},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":380,"tag":380,"options":505,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":507},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":509,"@type":47,"tagName":75,"properties":510,"responsiveStyles":511},"builder-pixel-nvwfex6oqq",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":512},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":514},{"path":29,"query":515},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":402,"winningTest":62,"breakpoints":522,"lastPreviewUrl":523,"hasLinks":6,"originalContentId":223,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":525,"id":526,"name":527,"modelId":225,"published":13,"query":528,"data":531,"variations":634,"lastUpdated":635,"firstPublished":636,"testRatio":23,"screenshot":637,"createdBy":92,"lastUpdatedBy":638,"folders":639,"meta":640,"rev":404},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[529],{"@type":228,"property":229,"operator":230,"value":530},"/uc/account-takeover-detection",{"title":527,"customFonts":532,"jsCode":29,"seoTitle":527,"seoDescription":537,"fontAwesomeIcon":538,"tsCode":29,"blocks":539,"url":530,"state":631},[533],{"kind":237,"category":259,"variants":534,"menu":260,"files":535,"family":236,"subsets":536,"version":238,"lastModified":239},[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"300italic":257,"500italic":256,"800italic":249,"700italic":251,"italic":253,"900italic":250,"600italic":258,"200italic":255,"regular":254,"100italic":252},[262,263],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[540,626],{"@type":47,"@version":48,"tagName":287,"id":541,"meta":542,"children":543},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":288},[544,560,567,574,583,593,603,613,620],{"@type":47,"@version":48,"id":545,"meta":546,"component":547,"responsiveStyles":558},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":292},{"name":291,"options":548,"isRSC":62},{"title":527,"description":549,"points":550,"video":557},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[551,553,555],{"item":552},"Identify credential-based ATO as it unfolds",{"item":554},"Surface hijacked sessions and token misuse",{"item":556},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":559},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":561,"meta":562,"component":563,"responsiveStyles":565},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":308},{"name":310,"options":564,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":566},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":568,"meta":569,"component":570,"responsiveStyles":572},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":316},{"name":318,"options":571,"isRSC":62},{"darkMode":34},{"large":573},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":575,"component":576,"responsiveStyles":581},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":323,"tag":323,"options":577,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":578,"description":579,"image":580,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":582},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":584,"meta":585,"component":586,"responsiveStyles":591},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":335},{"name":337,"options":587,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":588,"description":589,"reverse":34,"image":590},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":592},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":348,"marginTop":348},{"@type":47,"@version":48,"id":594,"meta":595,"component":596,"responsiveStyles":601},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":350},{"name":337,"options":597,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":598,"description":599,"reverse":6,"image":600},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":602},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":604,"meta":605,"component":606,"responsiveStyles":611},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":361},{"name":337,"options":607,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":608,"description":609,"reverse":34,"image":610},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":612},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":614,"meta":615,"component":616,"responsiveStyles":618},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":372},{"name":318,"options":617,"isRSC":62},{"darkMode":6},{"large":619},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":621,"component":622,"responsiveStyles":624},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":380,"tag":380,"options":623,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":625},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":627,"@type":47,"tagName":75,"properties":628,"responsiveStyles":629},"builder-pixel-btsbbovxynt",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":630},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":632},{"path":29,"query":633},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":641,"hasLinks":6,"originalContentId":223,"breakpoints":642,"winningTest":62,"kind":402,"hasAutosaves":34,"hasErrors":6},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":644,"id":645,"name":646,"modelId":225,"published":13,"query":647,"data":650,"variations":753,"lastUpdated":754,"firstPublished":755,"testRatio":23,"screenshot":756,"createdBy":92,"lastUpdatedBy":638,"folders":757,"meta":758,"rev":404},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[648],{"@type":228,"property":229,"operator":230,"value":649},"/uc/attack-path-hardening",{"tsCode":29,"seoDescription":651,"jsCode":29,"customFonts":652,"fontAwesomeIcon":657,"seoTitle":646,"title":646,"blocks":658,"url":649,"state":750},"Harden access paths with visibility,  detection, and guardrails.",[653],{"kind":237,"files":654,"version":238,"lastModified":239,"subsets":655,"menu":260,"category":259,"variants":656,"family":236},{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"regular":254,"italic":253,"800italic":249,"500italic":256,"600italic":258,"200italic":255,"900italic":250,"700italic":251,"100italic":252,"300italic":257},[262,263],[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],"faRadar",[659,745],{"@type":47,"@version":48,"tagName":287,"id":660,"meta":661,"children":662},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":541},[663,679,686,693,702,712,722,732,739],{"@type":47,"@version":48,"id":664,"meta":665,"component":666,"responsiveStyles":677},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":545},{"name":291,"options":667,"isRSC":62},{"title":646,"description":668,"points":669,"video":676},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[670,672,674],{"item":671},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":673},"Monitor how users actually log in across apps, flows, and tools",{"item":675},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":678},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":680,"meta":681,"component":682,"responsiveStyles":684},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":561},{"name":310,"options":683,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":685},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":687,"meta":688,"component":689,"responsiveStyles":691},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":568},{"name":318,"options":690,"isRSC":62},{"darkMode":34},{"large":692},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":694,"component":695,"responsiveStyles":700},"builder-dec0246085e1485c803f7152b1922a81",{"name":323,"tag":323,"options":696,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":697,"description":698,"image":699,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":701},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":703,"meta":704,"component":705,"responsiveStyles":710},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":584},{"name":337,"options":706,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":707,"description":708,"reverse":34,"image":709},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":711},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":347,"marginTop":348},{"@type":47,"@version":48,"id":713,"meta":714,"component":715,"responsiveStyles":720},"builder-431d175c59004669b0b2776b07d71737",{"previousId":594},{"name":337,"options":716,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":717,"description":718,"reverse":6,"image":719},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":721},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":723,"meta":724,"component":725,"responsiveStyles":730},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":604},{"name":337,"options":726,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":727,"description":728,"reverse":34,"image":729},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":731},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":733,"meta":734,"component":735,"responsiveStyles":737},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":614},{"name":318,"options":736,"isRSC":62},{"darkMode":6},{"large":738},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":740,"component":741,"responsiveStyles":743},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":380,"tag":380,"options":742,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":744},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":746,"@type":47,"tagName":75,"properties":747,"responsiveStyles":748},"builder-pixel-0c8xawitq8wi",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":749},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":751},{"path":29,"query":752},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":402,"lastPreviewUrl":759,"breakpoints":760,"hasLinks":6,"originalContentId":526,"winningTest":62,"hasAutosaves":34},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":762,"id":763,"name":764,"modelId":225,"published":13,"query":765,"data":768,"variations":873,"lastUpdated":874,"firstPublished":875,"testRatio":23,"screenshot":876,"createdBy":92,"lastUpdatedBy":638,"folders":877,"meta":878,"rev":404},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[766],{"@type":228,"property":229,"operator":230,"value":767},"/uc/clickfix-protection",{"seoDescription":769,"fontAwesomeIcon":770,"customFonts":771,"seoTitle":776,"jsCode":29,"tsCode":29,"title":776,"blocks":777,"url":767,"state":870},"Block attacks that trick users into running malicious code.","faLaptopCode",[772],{"files":773,"subsets":774,"menu":260,"version":238,"kind":237,"family":236,"lastModified":239,"variants":775,"category":259},{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"200italic":255,"800italic":249,"700italic":251,"600italic":258,"100italic":252,"italic":253,"regular":254,"300italic":257,"500italic":256,"900italic":250},[262,263],[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],"ClickFix protection",[778,865],{"@type":47,"@version":48,"tagName":287,"id":779,"meta":780,"children":781},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":660},[782,798,805,812,822,832,842,852,859],{"@type":47,"@version":48,"id":783,"meta":784,"component":785,"responsiveStyles":796},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":664},{"name":291,"options":786,"isRSC":62},{"title":776,"description":787,"points":788,"image":795},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[789,791,793],{"item":790},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":792},"Block malicious copy-and-paste actions before code is executed",{"item":794},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":797},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":799,"meta":800,"component":801,"responsiveStyles":803},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":680},{"name":310,"options":802,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":804},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":806,"meta":807,"component":808,"responsiveStyles":810},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":687},{"name":318,"options":809,"isRSC":62},{"darkMode":34},{"large":811},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":813,"meta":814,"component":815,"responsiveStyles":820},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":694},{"name":323,"tag":323,"options":816,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":817,"description":818,"reverse":6,"image":819},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":821},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":823,"meta":824,"component":825,"responsiveStyles":830},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":703},{"name":337,"options":826,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":827,"description":828,"reverse":34,"image":829},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":831},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":347,"marginTop":348},{"@type":47,"@version":48,"id":833,"meta":834,"component":835,"responsiveStyles":840},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":713},{"name":337,"options":836,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":837,"description":838,"reverse":6,"image":839},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":841},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":843,"meta":844,"component":845,"responsiveStyles":850},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":723},{"name":337,"options":846,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":847,"description":848,"reverse":34,"image":849},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":851},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":853,"meta":854,"component":855,"responsiveStyles":857},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":733},{"name":318,"options":856,"isRSC":62},{"darkMode":6},{"large":858},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":860,"component":861,"responsiveStyles":863},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":380,"tag":380,"options":862,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":864},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":866,"@type":47,"tagName":75,"properties":867,"responsiveStyles":868},"builder-pixel-x6do08ri7rb",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":869},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":871},{"path":29,"query":872},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":879,"originalContentId":645,"winningTest":62,"hasLinks":6,"kind":402,"breakpoints":880,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":882,"id":883,"name":884,"modelId":225,"published":13,"query":885,"data":888,"variations":993,"lastUpdated":994,"firstPublished":995,"testRatio":23,"screenshot":996,"createdBy":92,"lastUpdatedBy":638,"folders":997,"meta":998,"rev":404},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[886],{"@type":228,"property":229,"operator":230,"value":887},"/uc/incident-response",{"seoDescription":889,"customFonts":890,"title":884,"jsCode":29,"fontAwesomeIcon":895,"seoTitle":896,"tsCode":29,"blocks":897,"url":887,"state":990},"Investigate and respond faster with unique browser telemetry.",[891],{"kind":237,"subsets":892,"menu":260,"variants":893,"category":259,"family":236,"version":238,"lastModified":239,"files":894},[262,263],[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"900italic":250,"600italic":258,"200italic":255,"300italic":257,"100italic":252,"700italic":251,"800italic":249,"regular":254,"italic":253,"500italic":256},"faSatelliteDish","Browser based incident response",[898,985],{"@type":47,"@version":48,"tagName":287,"id":899,"meta":900,"children":901},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":660},[902,919,926,933,942,952,962,972,979],{"@type":47,"@version":48,"id":903,"meta":904,"component":905,"responsiveStyles":917},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":664},{"name":291,"options":906,"isRSC":62},{"title":907,"description":908,"points":909,"video":916},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[910,912,914],{"item":911},"Reconstruct what happened with real browser session context",{"item":913},"Investigate faster with real-world session context",{"item":915},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":918},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":920,"meta":921,"component":922,"responsiveStyles":924},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":680},{"name":310,"options":923,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":925},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":927,"meta":928,"component":929,"responsiveStyles":931},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":687},{"name":318,"options":930,"isRSC":62},{"darkMode":34},{"large":932},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":934,"component":935,"responsiveStyles":940},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":323,"tag":323,"options":936,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":937,"description":938,"image":939,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":941},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":943,"meta":944,"component":945,"responsiveStyles":950},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":703},{"name":337,"options":946,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":947,"description":948,"reverse":34,"image":949},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":951},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":348,"marginTop":348},{"@type":47,"@version":48,"id":953,"meta":954,"component":955,"responsiveStyles":960},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":713},{"name":337,"options":956,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":957,"description":958,"reverse":6,"image":959},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":961},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":963,"meta":964,"component":965,"responsiveStyles":970},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":723},{"name":337,"options":966,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":967,"description":968,"reverse":34,"image":969},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":971},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":973,"meta":974,"component":975,"responsiveStyles":977},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":733},{"name":318,"options":976,"isRSC":62},{"darkMode":6},{"large":978},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":980,"component":981,"responsiveStyles":983},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":380,"tag":380,"options":982,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":984},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":986,"@type":47,"tagName":75,"properties":987,"responsiveStyles":988},"builder-pixel-72p1v8tgtev",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":989},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":991},{"path":29,"query":992},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":402,"breakpoints":999,"originalContentId":645,"winningTest":62,"lastPreviewUrl":1000,"hasLinks":6,"hasAutosaves":34,"hasErrors":6},{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1002,"id":1003,"name":1004,"modelId":225,"published":13,"query":1005,"data":1008,"variations":1113,"lastUpdated":1114,"firstPublished":1115,"testRatio":23,"screenshot":1116,"createdBy":92,"lastUpdatedBy":638,"folders":1117,"meta":1118,"rev":404},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1006],{"@type":228,"property":229,"operator":230,"value":1007},"/uc/shadow-saas",{"seoTitle":1009,"seoDescription":1010,"customFonts":1011,"fontAwesomeIcon":1016,"title":1017,"jsCode":29,"tsCode":29,"blocks":1018,"url":1007,"state":1110},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1012],{"kind":237,"variants":1013,"files":1014,"family":236,"version":238,"subsets":1015,"lastModified":239,"category":259,"menu":260},[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"300italic":257,"500italic":256,"regular":254,"900italic":250,"italic":253,"100italic":252,"200italic":255,"600italic":258,"700italic":251,"800italic":249},[262,263],"faShieldCheck","Secure shadow SaaS",[1019,1105],{"@type":47,"@version":48,"tagName":287,"id":1020,"meta":1021,"children":1022},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":899},[1023,1039,1046,1053,1062,1072,1082,1092,1099],{"@type":47,"@version":48,"id":1024,"meta":1025,"component":1026,"responsiveStyles":1037},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":903},{"name":291,"options":1027,"isRSC":62},{"title":1009,"description":1028,"points":1029,"video":1036},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1030,1032,1034],{"item":1031},"Discover every SaaS app users access, managed or not",{"item":1033},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1035},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1038},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":1040,"meta":1041,"component":1042,"responsiveStyles":1044},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":920},{"name":310,"options":1043,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":1045},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":1047,"meta":1048,"component":1049,"responsiveStyles":1051},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":927},{"name":318,"options":1050,"isRSC":62},{"darkMode":34},{"large":1052},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1054,"component":1055,"responsiveStyles":1060},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":323,"tag":323,"options":1056,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":1057,"description":1058,"image":1059,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1061},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1063,"meta":1064,"component":1065,"responsiveStyles":1070},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":943},{"name":337,"options":1066,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":1067,"description":1068,"reverse":34,"image":1069},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1071},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":348,"marginTop":348},{"@type":47,"@version":48,"id":1073,"meta":1074,"component":1075,"responsiveStyles":1080},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":953},{"name":337,"options":1076,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":1077,"description":1078,"reverse":6,"image":1079},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1081},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":1083,"meta":1084,"component":1085,"responsiveStyles":1090},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":963},{"name":337,"options":1086,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":1087,"description":1088,"reverse":34,"image":1089},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1091},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":1093,"meta":1094,"component":1095,"responsiveStyles":1097},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":973},{"name":318,"options":1096,"isRSC":62},{"darkMode":6},{"large":1098},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1100,"component":1101,"responsiveStyles":1103},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":380,"tag":380,"options":1102,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":1104},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":1106,"@type":47,"tagName":75,"properties":1107,"responsiveStyles":1108},"builder-pixel-i9jump5glm9",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":1109},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":1111},{"path":29,"query":1112},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":883,"winningTest":62,"lastPreviewUrl":1119,"breakpoints":1120,"kind":402,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":1122,"id":1123,"name":1124,"modelId":225,"published":13,"stageModifiedSincePublish":6,"query":1125,"data":1128,"variations":1234,"lastUpdated":1235,"firstPublished":1236,"testRatio":23,"screenshot":1237,"createdBy":92,"lastUpdatedBy":397,"folders":1238,"meta":1239,"rev":404},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1126],{"@type":228,"property":229,"operator":230,"value":1127},"/uc/shadow-ai",{"seoTitle":1129,"fontAwesomeIcon":1130,"title":1131,"seoDescription":1132,"customFonts":1133,"tsCode":29,"jsCode":29,"blocks":1138,"url":1127,"state":1231},"Secure AI native and AI enhanced apps. ","faBrainCircuit","Secure AI","See and control AI apps in the browser.",[1134],{"version":238,"files":1135,"kind":237,"family":236,"lastModified":239,"category":259,"variants":1136,"subsets":1137,"menu":260},{"100":241,"200":242,"300":243,"500":244,"600":245,"700":246,"800":247,"900":248,"700italic":251,"100italic":252,"600italic":258,"italic":253,"300italic":257,"200italic":255,"500italic":256,"800italic":249,"900italic":250,"regular":254},[265,266,267,268,269,270,72,271,272,273,274,275,276,277,278,279,280,281],[262,263],[1139,1226],{"@type":47,"@version":48,"tagName":287,"id":1140,"meta":1141,"children":1142},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1020},[1143,1159,1166,1173,1183,1193,1203,1213,1220],{"@type":47,"@version":48,"id":1144,"meta":1145,"component":1146,"responsiveStyles":1157},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1024},{"name":291,"options":1147,"isRSC":62},{"title":1131,"description":1148,"points":1149,"image":1156},"\u003Cp>Every AI interaction traverses the browser. Employees use GenAI tools, connect AI apps to corporate accounts, and run agentic workflows, often outside security oversight. Push gives security teams the visibility to see what AI is doing across their environment and the controls to intervene before sensitive data leaves or access gets abused.\u003C/p>",[1150,1152,1154],{"item":1151},"Discover every AI tool and agent active across your workforce",{"item":1153},"Detect sensitive data being submitted to AI apps",{"item":1155},"Enforce AI policy directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1158},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":306},{"@type":47,"@version":48,"id":1160,"meta":1161,"component":1162,"responsiveStyles":1164},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1040},{"name":310,"options":1163,"isRSC":62},{"AllPartners":34,"backgroundTransparent":6},{"large":1165},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"backgroundColor":314},{"@type":47,"@version":48,"id":1167,"meta":1168,"component":1169,"responsiveStyles":1171},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1047},{"name":318,"options":1170,"isRSC":62},{"darkMode":34},{"large":1172},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1174,"meta":1175,"component":1176,"responsiveStyles":1181},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1054},{"name":323,"tag":323,"options":1177,"isRSC":62},{"darkMode":6,"maxWidth":327,"maxTextWidth":328,"title":1178,"description":1179,"image":1180,"reverse":6},"\u003Ch2>The browser is where AI lives\u003C/h2>","\u003Cp>AI activity doesn't happen at the network layer or the endpoint. It happens in the browser, where employees interact with AI tools, where agents execute tasks, and where sensitive data gets submitted to external services. Push captures live telemetry from inside the browser session, identifying every AI-native and AI-enhanced application in use. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1182},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1184,"meta":1185,"component":1186,"responsiveStyles":1191},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1063},{"name":337,"options":1187,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":340,"title":1188,"description":1189,"reverse":34,"image":1190},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Most organisations are using far more AI than they've approved. Push identifies every AI-native and AI-enhanced application accessed across the workforce, which corporate identities are connected, and what new tools appear in the environment. Applications are categorized by risk and policy status so security teams can prioritize exposure before it becomes an incident.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F636e65ad0c4c43faa3e626c41e90d8a3",{"large":1192},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"fontFamily":346,"paddingTop":348,"marginTop":348},{"@type":47,"@version":48,"id":1194,"meta":1195,"component":1196,"responsiveStyles":1201},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1073},{"name":337,"options":1197,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":353,"title":1198,"description":1199,"reverse":6,"image":1200},"\u003Ch2>Prevent sensitive data from reaching the wrong AI tools\u003C/h2>","\u003Cp>Employees paste credentials, customer data, and internal documents into AI tools without realizing the risk. Push detects sensitive data interactions in the browser in real time, including file uploads, clipboard activity, and form submissions to unsanctioned or high-risk AI applications. Controls can be applied to warn users, require policy acknowledgment, or block the interaction entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F011332d42dab4a299f25ab3847741ed9",{"large":1202},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":359},{"@type":47,"@version":48,"layerName":337,"id":1204,"meta":1205,"component":1206,"responsiveStyles":1211},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1083},{"name":337,"options":1207,"isRSC":62},{"darkMode":6,"maxWidth":327,"imageMaxWidth":339,"textPaddingTop":364,"title":1208,"description":1209,"reverse":34,"image":1210},"\u003Ch2>Govern agentic AI permissions and activity\u003C/h2>","\u003Cp>AI agents operating in the browser can access applications, execute actions, and handle data on behalf of users, often with permissions that were never explicitly reviewed. Push surfaces agentic permissions and data flows so security teams can see what agents are doing, where they have access, and apply controls before that access is exploited or abused.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F71549a73d0b84f1c8cb151c05e493e8d",{"large":1212},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69,"paddingTop":370},{"@type":47,"@version":48,"id":1214,"meta":1215,"component":1216,"responsiveStyles":1218},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1093},{"name":318,"options":1217,"isRSC":62},{"darkMode":6},{"large":1219},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"@type":47,"@version":48,"id":1221,"component":1222,"responsiveStyles":1224},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":380,"tag":380,"options":1223,"isRSC":62},{"sectionHeading":29,"customClass":382},{"large":1225},{"display":65,"flexDirection":66,"position":67,"flexShrink":68,"boxSizing":69},{"id":1227,"@type":47,"tagName":75,"properties":1228,"responsiveStyles":1229},"builder-pixel-n3jbwe8o8f",{"src":77,"aria-hidden":78,"alt":29,"role":79,"width":68,"height":68},{"large":1230},{"height":68,"width":68,"display":82,"opacity":68,"overflow":83,"pointerEvents":84},{"deviceSize":86,"location":1232},{"path":29,"query":1233},{},{},1778073860450,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9b4d5666fc9e495a9a8de4258975cd9f",[],{"lastPreviewUrl":1240,"hasLinks":6,"originalContentId":1003,"winningTest":62,"breakpoints":1241,"kind":402,"hasAutosaves":6,"hasErrors":6},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"w":1243,"h":1244,"d":1245},448,512,"M280.4 48c-3.2 0-6.3 .5-9.3 1.4L206.6 69.2C136.1 90.9 88 156.1 88 229.8l0 42.9c22.7 3.8 40 23.6 40 47.3l0 144c0 26.5-21.5 48-48 48l-32 0c-26.5 0-48-21.5-48-48L0 320c0-23.8 17.3-43.5 40-47.3l0-42.9C40 135 101.8 51.2 192.5 23.4L256.9 3.5c7.6-2.3 15.5-3.5 23.4-3.5 44 0 79.6 35.7 79.6 79.6l0 56.4c0 13.3-10.7 24-24 24s-24-10.7-24-24l0-56.4C312 62.2 297.8 48 280.4 48zM48 320l0 144 32 0 0-144-32 0zm208 24c0-71.6 55.6-127.8 89-148.1 4.3-2.6 9.6-2.6 14 0 33.5 20.3 89 76.6 89 148.1 0 32-16 80-64 112l27.3 27.3c3 3 4.7 7.1 4.7 11.3l0 1.4c0 8.8-7.2 16-16 16l-96 0c-8.8 0-16-7.2-16-16l0-1.4c0-4.2 1.7-8.3 4.7-11.3L320 456c-48-32-64-80-64-112zm128-32a24 24 0 1 0 -48 0 24 24 0 1 0 48 0z",{"w":1244,"h":1244,"d":1247},"M201.1 57.3c-7 5.3-9.1 10.7-9.1 14.7 0 4.2 2.4 10.1 10.4 15.6 7.8 5.3 13.6 14.6 13.6 25.6 0 17-13.8 30.7-30.7 30.7L56 144c-4.4 0-8 3.6-8 8l0 52.5c7.4-2.9 15.5-4.5 24-4.5 43.1 0 72 39.4 72 80s-28.9 80-72 80c-8.5 0-16.6-1.6-24-4.5L48 456c0 4.4 3.6 8 8 8l100.5 0c-2.9-7.4-4.5-15.5-4.5-24 0-43.1 39.4-72 80-72s80 28.9 80 72c0 8.5-1.6 16.6-4.5 24l52.5 0c4.4 0 8-3.6 8-8l0-129.3c0-17 13.8-30.7 30.7-30.7 11.1 0 20.3 5.8 25.6 13.6 5.5 8 11.4 10.4 15.6 10.4 4 0 9.5-2.1 14.7-9.1s9.3-17.9 9.3-30.9-4-23.8-9.3-30.9-10.7-9.1-14.7-9.1c-4.2 0-10.1 2.4-15.6 10.4-5.3 7.8-14.6 13.6-25.6 13.6-17 0-30.7-13.8-30.7-30.7l0-81.3c0-4.4-3.6-8-8-8l-81.3 0c-17 0-30.7-13.8-30.7-30.7 0-11.1 5.8-20.3 13.6-25.6 8-5.5 10.4-11.4 10.4-15.6 0-4-2.1-9.5-9.1-14.7S245 48 232 48 208.2 52 201.1 57.3zM172.3 18.9C188.5 6.8 209.6 0 232 0S275.5 6.8 291.7 18.9 320 49.5 320 72c0 8.6-1.8 16.7-4.9 24L360 96c30.9 0 56 25.1 56 56l0 44.9c7.3-3.1 15.4-4.9 24-4.9 22.5 0 41 12.2 53.1 28.3s18.9 37.3 18.9 59.7-6.8 43.5-18.9 59.7-30.6 28.3-53.1 28.3c-8.6 0-16.7-1.8-24-4.9l0 92.9c0 30.9-25.1 56-56 56l-78.1 0c-18.7 0-33.9-15.2-33.9-33.9 0-10.1 4.5-18.5 9.9-24.2 4.2-4.3 6.1-9.2 6.1-13.9 0-9.9-10.7-24-32-24s-32 14.1-32 24c0 4.7 1.9 9.5 6.1 13.9 5.5 5.7 9.9 14.1 9.9 24.2 0 18.7-15.2 33.9-33.9 33.9L56 512c-30.9 0-56-25.1-56-56L0 329.9c0-18.7 15.2-33.9 33.9-33.9 10.1 0 18.5 4.5 24.2 9.9 4.3 4.2 9.2 6.1 13.9 6.1 9.9 0 24-10.7 24-32s-14.1-32-24-32c-4.7 0-9.5 1.9-13.9 6.1-5.7 5.5-14.1 9.9-24.2 9.9-18.7 0-33.9-15.2-33.9-33.9L0 152c0-30.9 25.1-56 56-56l92.9 0c-3.1-7.3-4.9-15.4-4.9-24 0-22.5 12.2-41 28.3-53.1z",{"w":1243,"h":1244,"d":1249},"M102.7 96c10.4-53.7 31.9-112 68.3-112 9.6 0 19 3.9 27.5 8.2 8.2 4.1 18.4 7.8 25.5 7.8s17.3-3.7 25.5-7.8c8.5-4.3 17.9-8.2 27.5-8.2 36.4 0 57.8 58.3 68.3 112L376 96c13.3 0 24 10.7 24 24s-10.7 24-24 24l-24 0 0 32c0 17-3.3 33.2-9.3 48l33.3 0c8.1 0 15.6 4 20 10.8s5.2 15.2 2.1 22.6l-31.5 74.2c48.9 31.2 81.4 86 81.4 148.5l0 8c0 13.3-10.7 24-24 24s-24-10.7-24-24l0-8c0-51.4-30.3-95.8-74.1-116.1-11.7-5.5-17-19.2-12-31.2l25.8-60.7-27.7 0c-1.1 0-2.1-.1-3.1-.2-22.6 20-52.3 32.2-84.9 32.2s-62.3-12.2-84.9-32.2c-1 .1-2.1 .2-3.1 .2l-27.7 0 25.8 60.7c5.1 11.9-.2 25.7-12 31.2-43.8 20.4-74.1 64.7-74.1 116.1l0 8c0 13.3-10.7 24-24 24S0 501.3 0 488l0-8c0-62.4 32.5-117.2 81.4-148.5L49.9 257.4c-3.2-7.4-2.4-15.9 2.1-22.6S63.9 224 72 224l33.3 0c-6-14.8-9.3-31-9.3-48l0-32-24 0c-13.3 0-24-10.7-24-24S58.7 96 72 96l30.7 0zm45.9 107c11.1 30.9 40.6 53 75.3 53s64.2-22.1 75.3-53c-5.7 3.2-12.3 5-19.3 5l-12.4 0c-16.5 0-31.1-10.6-36.3-26.2-2.3-7-12.2-7-14.5 0-5.2 15.6-19.9 26.2-36.3 26.2L168 208c-7 0-13.6-1.8-19.3-5zm44.8 133l61 0c9.7 0 17.5 7.8 17.5 17.5 0 4.2-1.5 8.2-4.2 11.4l-27.9 32.5 28.9 82.6c5.5 15.6-6.1 31.9-22.7 31.9l-44.3 0c-16.5 0-28.1-16.3-22.7-31.9l28.9-82.6-27.9-32.5c-2.7-3.2-4.2-7.2-4.2-11.4 0-9.7 7.8-17.5 17.5-17.5z",{"w":1244,"h":1244,"d":1251},"M304.8 173.3c-14.3-8.4-31-13.3-48.8-13.3-53 0-96 43-96 96s43 96 96 96 96-43 96-96l48 0c0 79.5-64.5 144-144 144s-144-64.5-144-144 64.5-144 144-144c31.1 0 59.9 9.9 83.4 26.6l45.7-45.7C349.7 64.8 304.8 48 256 48 141.1 48 48 141.1 48 256s93.1 208 208 208 208-93.1 208-208l48 0c0 141.4-114.6 256-256 256S0 397.4 0 256 114.6 0 256 0c62.1 0 118.9 22.1 163.3 58.8L463 15c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9L273 273c-9.4 9.4-24.6 9.4-33.9 0s-9.4-24.6 0-33.9l65.7-65.7z",{"w":32,"h":1244,"d":1253},"M128 80l384 0c8.8 0 16 7.2 16 16l0 208 48 0 0-208c0-35.3-28.7-64-64-64L128 32C92.7 32 64 60.7 64 96l0 208 48 0 0-208c0-8.8 7.2-16 16-16zM52.8 400l534.4 0c-8.5 18.9-27.5 32-49.6 32l-435.2 0c-22.1 0-41.1-13.1-49.6-32zM25.6 352C11.5 352 0 363.5 0 377.6 0 434.2 45.8 480 102.4 480l435.2 0c56.6 0 102.4-45.8 102.4-102.4 0-14.1-11.5-25.6-25.6-25.6L25.6 352zM281 169c9.4-9.4 9.4-24.6 0-33.9s-24.6-9.4-33.9 0l-48 48c-9.4 9.4-9.4 24.6 0 33.9l48 48c9.4 9.4 24.6 9.4 33.9 0s9.4-24.6 0-33.9l-31-31 31-31zM393 135c-9.4-9.4-24.6-9.4-33.9 0s-9.4 24.6 0 33.9l31 31-31 31c-9.4 9.4-9.4 24.6 0 33.9s24.6 9.4 33.9 0l48-48c9.4-9.4 9.4-24.6 0-33.9l-48-48z",{"w":1244,"h":1244,"d":1255},"M232 0c-13.3 0-24 10.7-24 24s10.7 24 24 24c128.1 0 232 103.9 232 232 0 13.3 10.7 24 24 24s24-10.7 24-24C512 125.4 386.6 0 232 0zM48 256c0-23 3.7-45 10.5-65.6l263 263C301 460.3 279 464 256 464 141.1 464 48 370.9 48 256zM72.8 136.8c-14.1-14.1-37.6-12-46.5 5.8-16.9 34.2-26.4 72.6-26.4 113.3 0 141.4 114.6 256 256 256 40.7 0 79.2-9.5 113.3-26.4 17.9-8.8 19.9-32.4 5.8-46.5L241 305 281 265c9.4-9.4 9.4-24.6 0-33.9s-24.6-9.4-33.9 0L207 271 72.8 136.8zM208 120c0 13.3 10.7 24 24 24 75.1 0 136 60.9 136 136 0 13.3 10.7 24 24 24s24-10.7 24-24c0-101.6-82.4-184-184-184-13.3 0-24 10.7-24 24z",{"w":1244,"h":1244,"d":1257},"M256.1 0c4.6 0 9.2 1 13.3 2.9L457.8 82.8c22 9.3 38.4 31 38.3 57.2-.5 99.2-41.3 280.7-213.6 363.2-16.7 8-36.1 8-52.8 0-172.4-82.5-213.2-263.9-213.7-363.2-.1-26.2 16.3-47.9 38.3-57.2L242.7 2.9C246.8 1 251.4 0 256.1 0zM73.1 127c-5.9 2.5-9.1 7.7-9 12.7 .5 91.4 38.4 249.3 186.4 320.1 3.6 1.7 7.8 1.7 11.3 0 148-70.8 185.9-228.7 186.3-320.1 0-5-3.1-10.2-9-12.7l-183-77.6-183 77.6zm240.3 34.9c7.8-10.7 22.8-13.1 33.5-5.3 10.7 7.8 13.1 22.8 5.3 33.5L249.8 330.9c-4.2 5.7-10.7 9.3-17.8 9.8s-14-2.2-18.9-7.3l-46.4-48c-9.2-9.5-9-24.7 .6-33.9 9.5-9.2 24.7-8.9 33.9 .6l26.5 27.4 85.6-117.7z",{"w":1244,"h":1244,"d":1259},"M123 58.1c9.5-33.5 40.4-58.1 77-58.1 21.8 0 41.6 8.7 56 22.9 14.4-14.1 34.2-22.9 56-22.9 36.6 0 67.4 24.6 77 58.1 47.4 9.7 83 51.6 83 101.9 0 11.3-1.8 22.2-5.1 32.3 22.7 19.1 37.1 47.7 37.1 79.7 0 23.7-8 45.6-21.3 63.1 3.5 10.4 5.3 21.4 5.3 32.9 0 54-41.2 98.5-93.9 103.5-15.6 24.3-42.9 40.5-74.1 40.5-25.2 0-48-10.6-64-27.6-16 17-38.8 27.6-64 27.6-31.1 0-58.4-16.2-74.1-40.5-52.7-5.1-93.9-49.5-93.9-103.5 0-11.5 1.9-22.5 5.3-32.9-13.4-17.5-21.3-39.4-21.3-63.1 0-32 14.5-60.6 37.1-79.7-3.3-10.2-5.1-21.1-5.1-32.3 0-50.3 35.6-92.2 83-101.9zM200 48c-17.7 0-32 14.3-32 32 0 13.3-10.7 24-24 24-30.9 0-56 25.1-56 56 0 10.5 2.9 20.3 7.9 28.6 3.4 5.7 4.3 12.5 2.5 18.9s-6.2 11.7-12 14.7c-18 9.3-30.3 28.1-30.3 49.8 0 16.1 6.8 30.7 17.8 40.9 7.9 7.4 9.9 19.2 4.8 28.8-4.2 7.8-6.5 16.7-6.5 26.3 0 30.9 25.1 56 56 56 1.1 0 2.2 0 3.2-.1 10.3-.6 19.8 5.5 23.6 15 5.9 14.7 20.4 25.1 37.1 25.1 20.4 0 37.2-15.3 39.7-35 .1-.6 .2-1.3 .3-1.9l0-135.1-40 0c-6.6 0-12 5.4-12 12l0 4.4c16.5 7.6 28 24.3 28 43.6 0 26.5-21.5 48-48 48s-48-21.5-48-48c0-19.4 11.5-36.1 28-43.6l0-4.4c0-28.7 23.3-52 52-52l40 0 0-56-12.4 0c-7.6 16.5-24.3 28-43.6 28-26.5 0-48-21.5-48-48s21.5-48 48-48c19.4 0 36.1 11.5 43.6 28l12.4 0 0-76c0-17.7-14.3-32-32-32zm80 148l0 152 40 0c6.6 0 12-5.4 12-12l0-4.4c-16.5-7.6-28-24.3-28-43.6 0-26.5 21.5-48 48-48s48 21.5 48 48c0 19.4-11.5 36.1-28 43.6l0 4.4c0 28.7-23.3 52-52 52l-40 0 0 39.1c.1 .6 .2 1.2 .3 1.9 2.5 19.7 19.3 35 39.7 35 16.8 0 31.2-10.3 37.1-25.1 3.8-9.6 13.3-15.6 23.6-15 1.1 .1 2.2 .1 3.2 .1 30.9 0 56-25.1 56-56 0-9.5-2.4-18.5-6.5-26.3-5.1-9.6-3.1-21.4 4.8-28.8 11-10.2 17.8-24.8 17.8-40.9 0-21.6-12.2-40.4-30.3-49.8-5.9-3-10.2-8.4-12-14.7s-.9-13.2 2.5-18.9c5-8.4 7.9-18.1 7.9-28.6 0-30.9-25.1-56-56-56-13.3 0-24-10.7-24-24 0-17.7-14.3-32-32-32s-32 14.3-32 32l0 76 12.4 0c7.6-16.5 24.3-28 43.6-28 26.5 0 48 21.5 48 48s-21.5 48-48 48c-19.4 0-36.1-11.5-43.6-28L280 196zm56-36a16 16 0 1 0 0 32 16 16 0 1 0 0-32zm0 128a16 16 0 1 0 32 0 16 16 0 1 0 -32 0zM144 352a16 16 0 1 0 32 0 16 16 0 1 0 -32 0zm16-176a16 16 0 1 0 32 0 16 16 0 1 0 -32 0z",{"id":1261,"title":1262,"authorsCollection":1263,"content":1271,"extension":1887,"hashTags":62,"meta":1888,"metaTitle":1889,"ogImage":62,"publishedDate":1890,"relatedBlogPostsCollection":1891,"slug":3917,"stem":3918,"subtitle":62,"summary":3919,"synopsis":3942,"sys":3943,"tagsCollection":3946,"__hash__":3952},"blog/blog/verizon-dbir-2026-review.json","What the Verizon DBIR tells us about how breaches happen in 2026",{"items":1264},[1265],{"fullName":1266,"firstName":1267,"jobTitle":1268,"profilePicture":1269},"Mark Orlando","Mark","Field CTO",{"url":1270},"https://images.ctfassets.net/y1cdw1ablpvd/592PMwIQQFaa24k5SKBEKF/a33090d0ad95d1e3081f5d16a46ba826/image__68_.png",{"json":1272,"links":1816},{"nodeType":1273,"data":1274,"content":1275},"document",{},[1276,1285,1289,1299,1315,1322,1329,1338,1347,1354,1361,1367,1386,1402,1410,1426,1433,1440,1443,1451,1467,1473,1492,1498,1506,1530,1537,1540,1548,1555,1561,1568,1587,1595,1611,1614,1622,1638,1645,1652,1671,1674,1682,1689,1696,1703,1709,1717,1733,1740,1758,1761,1769,1776,1783,1790,1797],{"nodeType":1277,"data":1278,"content":1279},"paragraph",{},[1280],{"nodeType":1281,"value":1282,"marks":1283,"data":1284},"text","The headline finding getting the most airtime in 2026 is that vulnerability exploitation has overtaken credential abuse as the top single initial access vector, jumping to 31% from 20% the year before. The vulnerability management crisis driving this statistic is one of the most important stories in this year's data. But reading it as evidence that identity threats are receding would be a mistake, because the DBIR's own data tells a more complicated and more useful story when you look at the full picture.",[],{},{"nodeType":1286,"data":1287,"content":1288},"hr",{},[],{"nodeType":1290,"data":1291,"content":1292},"heading-1",{},[1293],{"nodeType":1281,"value":1294,"marks":1295,"data":1298},"Vulnerability exploitation has caught up with identity — not replaced it",[1296],{"type":1297},"bold",{},{"nodeType":1277,"data":1300,"content":1301},{},[1302,1306,1311],{"nodeType":1281,"value":1303,"marks":1304,"data":1305},"The DBIR's headline comparison pits vulnerability exploitation (31%) against credential abuse (13%) as individual vectors. That comparison is accurate but incomplete, because the DBIR tracks identity-related initial access across ",[],{},{"nodeType":1281,"value":1307,"marks":1308,"data":1310},"three",[1309],{"type":1297},{},{"nodeType":1281,"value":1312,"marks":1313,"data":1314}," separate categories: phishing (16%), credential abuse (13%), and pretexting (6%). Before interpreting those numbers, there's a methodological wrinkle worth understanding.",[],{},{"nodeType":1277,"data":1316,"content":1317},{},[1318],{"nodeType":1281,"value":1319,"marks":1320,"data":1321},"This year's report added pretexting as a newly tracked initial access vector, reclassifying some incidents previously counted as credential abuse. The DBIR is transparent about the effect: without that change, credential abuse would have been 16% rather than 13%. On an apples-to-apples basis, identity-related initial access (phishing 16% + credential abuse 16%) comes to 32% — versus 31% for vulnerability exploitation.",[],{},{"nodeType":1277,"data":1323,"content":1324},{},[1325],{"nodeType":1281,"value":1326,"marks":1327,"data":1328},"To be precise about what moved: phishing held roughly flat year over year, but credential abuse saw a modest decline even on the adjusted basis (from 22% to 16%). Overall, the identity picture is broadly stable. The reason the two categories have converged is that vulnerability exploitation surged 55%, not that identity attacks meaningfully receded.",[],{},{"nodeType":1330,"data":1331,"content":1337},"embedded-entry-block",{"target":1332},{"sys":1333},{"id":1334,"type":1335,"linkType":1336},"5GvSsSY4R6X34ZBMidZ54X","Link","Entry",[],{"nodeType":1339,"data":1340,"content":1341},"heading-2",{},[1342],{"nodeType":1281,"value":1343,"marks":1344,"data":1346},"The taxonomy gap",[1345],{"type":1297},{},{"nodeType":1277,"data":1348,"content":1349},{},[1350],{"nodeType":1281,"value":1351,"marks":1352,"data":1353},"It's also worth asking how much the DBIR's initial access taxonomy can tell us. The figure that everyone is citing — Figure 10 — is labelled \"select enumerations,\" and the four tracked vectors (vulnerability exploitation, phishing, credential abuse, pretexting) add up to only 66% of initial access. A third of the picture isn't represented in the headline breakdown at all.",[],{},{"nodeType":1277,"data":1355,"content":1356},{},[1357],{"nodeType":1281,"value":1358,"marks":1359,"data":1360},"The cluster boundaries and where you draw them also changes the story. The DBIR classifies ClickFix under \"baiting\" — a category that covers malicious downloads and SEO poisoning — rather than phishing, even though the end goal is often the same: getting a user to execute something they shouldn't. Pretexting absorbed incidents that were previously credential abuse, shifting the numbers between categories. These are useful analytical clusters, but they aren't clean divisions of a neatly partitioned attack surface.",[],{},{"nodeType":1330,"data":1362,"content":1366},{"target":1363},{"sys":1364},{"id":1365,"type":1335,"linkType":1336},"7t6ZcHDycaPOyLstX4r8zl",[],{"nodeType":1277,"data":1368,"content":1369},{},[1370,1374,1382],{"nodeType":1281,"value":1371,"marks":1372,"data":1373},"These are identity attacks at scale, and it isn't clear where — or whether — they show up in the DBIR's initial access vectors. This lack of depth in identity and in-browser attack vectors is common in many defensive models, which is why we've created our own",[],{},{"nodeType":1375,"data":1376,"content":1377},"hyperlink",{"uri":61},[1378],{"nodeType":1281,"value":1379,"marks":1380,"data":1381}," Browser and Identity Attacks Matrix",[],{},{"nodeType":1281,"value":1383,"marks":1384,"data":1385},".",[],{},{"nodeType":1277,"data":1387,"content":1388},{},[1389,1393,1398],{"nodeType":1281,"value":1390,"marks":1391,"data":1392},"That convergence at initial access also understates the role credentials play across full breach chains. The DBIR states plainly that credential abuse at any point in the breach progression — not just as the first action — appears in ",[],{},{"nodeType":1281,"value":1394,"marks":1395,"data":1397},"39% of all breaches",[1396],{"type":1297},{},{"nodeType":1281,"value":1399,"marks":1400,"data":1401},", making it the single most pervasive technique in the dataset. Credentials don't just open the front door; they unlock lateral movement, privilege escalation, and persistence throughout the attack chain.",[],{},{"nodeType":1339,"data":1403,"content":1404},{},[1405],{"nodeType":1281,"value":1406,"marks":1407,"data":1409},"The vulnerability treadmill",[1408],{"type":1297},{},{"nodeType":1277,"data":1411,"content":1412},{},[1413,1417,1422],{"nodeType":1281,"value":1414,"marks":1415,"data":1416},"The vulnerability exploitation surge itself is driven by a structural capacity crisis rather than a shift in attacker preference. Edge devices and VPNs now account for 22% of vulnerability-exploitation breaches, up from 3% the prior year — a ",[],{},{"nodeType":1281,"value":1418,"marks":1419,"data":1421},"sevenfold",[1420],{"type":276},{},{"nodeType":1281,"value":1423,"marks":1424,"data":1425}," increase. Organizations face 50% more CISA KEV vulnerabilities to remediate than a year ago, median remediation time has increased from 32 to 43 days, and the volume of vulnerability records in the dataset has grown roughly eightfold.",[],{},{"nodeType":1277,"data":1427,"content":1428},{},[1429],{"nodeType":1281,"value":1430,"marks":1431,"data":1432},"This trend was already visible in last year's DBIR, when vulnerability exploitation jumped from 15% to 20%. AI-assisted exploit development may be compounding the problem — the DBIR's own data shows 32% of AI-assisted initial access targeting vulnerability exploitation — but the structural capacity crisis was accelerating well before AI became a meaningful factor in the attacker toolkit.",[],{},{"nodeType":1277,"data":1434,"content":1435},{},[1436],{"nodeType":1281,"value":1437,"marks":1438,"data":1439},"The vulnerability treadmill is accelerating, and the DBIR's remediation data shows defenders losing ground. But this is an additive problem, not a substitution. Both attack surfaces are growing. ",[],{},{"nodeType":1286,"data":1441,"content":1442},{},[],{"nodeType":1290,"data":1444,"content":1445},{},[1446],{"nodeType":1281,"value":1447,"marks":1448,"data":1450},"Phishing has left the inbox",[1449],{"type":1297},{},{"nodeType":1277,"data":1452,"content":1453},{},[1454,1458,1463],{"nodeType":1281,"value":1455,"marks":1456,"data":1457},"41% percent of social engineering breaches now involve vectors other than email, with approximately a quarter coming from social media or phone-based channels. Voice phishing simulations show a ",[],{},{"nodeType":1281,"value":1459,"marks":1460,"data":1462},"40% higher success rate",[1461],{"type":1297},{},{"nodeType":1281,"value":1464,"marks":1465,"data":1466}," than email phishing — a median click rate of 2% versus 1.4%.",[],{},{"nodeType":1330,"data":1468,"content":1472},{"target":1469},{"sys":1470},{"id":1471,"type":1335,"linkType":1336},"7pK8qqIDDNmHmJmlcybNoe",[],{"nodeType":1277,"data":1474,"content":1475},{},[1476,1480,1488],{"nodeType":1281,"value":1477,"marks":1478,"data":1479},"Even within the email channel, the data confirms what",[],{},{"nodeType":1375,"data":1481,"content":1483},{"uri":1482},"https://pushsecurity.com/blog/the-top-10-security-problems-you-can-solve-in-the-browser-ranked-by-value/",[1484],{"nodeType":1281,"value":1485,"marks":1486,"data":1487}," browser-level detection data has been showing",[],{},{"nodeType":1281,"value":1489,"marks":1490,"data":1491},": credential harvesting dominates. The DBIR's email security gateway breakdown shows 80% of blocked attacks are credential or session phishing, with only 10% involving malware delivery, 5% callback phishing, and 3% BEC. If you're running an email security gateway, the vast majority of what it catches is credential phishing — and 41% of social engineering is arriving through channels it can't see at all.",[],{},{"nodeType":1330,"data":1493,"content":1497},{"target":1494},{"sys":1495},{"id":1496,"type":1335,"linkType":1336},"6CvwzQA3gJ8B3RFzLrH7Kp",[],{"nodeType":1339,"data":1499,"content":1500},{},[1501],{"nodeType":1281,"value":1502,"marks":1503,"data":1505},"The ClickFix detection gap",[1504],{"type":1297},{},{"nodeType":1277,"data":1507,"content":1508},{},[1509,1513,1521,1525],{"nodeType":1281,"value":1510,"marks":1511,"data":1512},"The DBIR reports ClickFix at only 2.7% of attacks detected at the browser level. For context,",[],{},{"nodeType":1375,"data":1514,"content":1516},{"uri":1515},"https://pushsecurity.com/blog/introducing-malicious-copy-paste-detection/",[1517],{"nodeType":1281,"value":1518,"marks":1519,"data":1520}," CrowdStrike reported a 563% increase in ClickFix lures",[],{},{"nodeType":1281,"value":1522,"marks":1523,"data":1524}," over the same period and Microsoft identified it as the most common initial access point at 47% of observed attacks. Push's own data shows ClickFix at a significantly higher proportion of browser-level detections, ",[],{},{"nodeType":1281,"value":1526,"marks":1527,"data":1529},"with 4 in 5 delivered via search engines specifically.",[1528],{"type":1297},{},{"nodeType":1277,"data":1531,"content":1532},{},[1533],{"nodeType":1281,"value":1534,"marks":1535,"data":1536},"The gap is striking, and the most likely explanation is a visibility one. ClickFix attacks result in a malware download or script execution on the endpoint — and without browser-layer context, that execution looks like any other malware delivery. If a contributing organization doesn't have visibility into the browser session that preceded the payload, they'd attribute the incident to \"malware download\" or \"user execution\" rather than ClickFix specifically. The DBIR's 2.7% probably reflects how often contributors could trace the chain back to a ClickFix page, not how often ClickFix was actually the delivery mechanism.",[],{},{"nodeType":1286,"data":1538,"content":1539},{},[],{"nodeType":1290,"data":1541,"content":1542},{},[1543],{"nodeType":1281,"value":1544,"marks":1545,"data":1547},"Stolen credentials are the ransomware on-ramp",[1546],{"type":1297},{},{"nodeType":1277,"data":1549,"content":1550},{},[1551],{"nodeType":1281,"value":1552,"marks":1553,"data":1554},"One of the most powerful findings in this year's DBIR is the quantification of the relationship between credential compromise and ransomware outcomes. Fifty percent of ransomware victims had a credential or infostealer event occur within 95 days prior to the ransomware attack, drawing a causal line from credential theft to ransomware deployment.",[],{},{"nodeType":1330,"data":1556,"content":1560},{"target":1557},{"sys":1558},{"id":1559,"type":1335,"linkType":1336},"3ZwG5UiweFR4fYiDaxJJDm",[],{"nodeType":1277,"data":1562,"content":1563},{},[1564],{"nodeType":1281,"value":1565,"marks":1566,"data":1567},"The infostealer supply chain data reinforces the picture. Infostealers are surfacing an average of 2,362 breached corporate credentials per month from organizational email domains in stealer log datasets, and 54% of devices in Initial Access Broker logs had at least one infostealer installed. The 95-day median window is consistent with the known timeline from credential harvest to ransomware deployment.",[],{},{"nodeType":1277,"data":1569,"content":1570},{},[1571,1575,1583],{"nodeType":1281,"value":1572,"marks":1573,"data":1574},"That timeline reinforces an argument we've been making about",[],{},{"nodeType":1375,"data":1576,"content":1578},{"uri":1577},"https://pushsecurity.com/blog/the-cisos-data-problem-and-how-browser-telemetry-can-help/",[1579],{"nodeType":1281,"value":1580,"marks":1581,"data":1582}," where the intervention point needs to be",[],{},{"nodeType":1281,"value":1584,"marks":1585,"data":1586},": detecting credential compromise upstream — at the point of credential entry, session creation, or stolen credential reuse — rather than waiting for the ransomware deployment that follows weeks or months later.",[],{},{"nodeType":1339,"data":1588,"content":1589},{},[1590],{"nodeType":1281,"value":1591,"marks":1592,"data":1594},"Post-compromise tradecraft is shifting",[1593],{"type":1297},{},{"nodeType":1277,"data":1596,"content":1597},{},[1598,1602,1607],{"nodeType":1281,"value":1599,"marks":1600,"data":1601},"The DBIR's post-compromise data adds another dimension. RMM tool abuse by threat actors showed a ",[],{},{"nodeType":1281,"value":1603,"marks":1604,"data":1606},"240% increase",[1605],{"type":1297},{},{"nodeType":1281,"value":1608,"marks":1609,"data":1610}," over the prior year, while traditional backdoor and C2 malware usage fell 27%. Attackers are increasingly living off the land with the same remote access tools IT teams use. Post-compromise detection is getting harder, which makes catching the initial credential compromise upstream that much more valuable.",[],{},{"nodeType":1286,"data":1612,"content":1613},{},[],{"nodeType":1290,"data":1615,"content":1616},{},[1617],{"nodeType":1281,"value":1618,"marks":1619,"data":1621},"Your vendors are half the problem",[1620],{"type":1297},{},{"nodeType":1277,"data":1623,"content":1624},{},[1625,1629,1634],{"nodeType":1281,"value":1626,"marks":1627,"data":1628},"Third-party involvement in breaches reached ",[],{},{"nodeType":1281,"value":1630,"marks":1631,"data":1633},"48%",[1632],{"type":1297},{},{"nodeType":1281,"value":1635,"marks":1636,"data":1637}," this year, up from 30% — a 60% increase that follows a prior year where the figure had already doubled.",[],{},{"nodeType":1277,"data":1639,"content":1640},{},[1641],{"nodeType":1281,"value":1642,"marks":1643,"data":1644},"The DBIR's root cause analysis maps directly to identity security: insecure authentication — absent MFA, improper credential rotation — and lack of least privilege enforcement account for a substantial share of cloud-based third-party incidents. Only 23% of third-party organizations fully remediated missing or improperly secured MFA on cloud accounts, and weak password and permission misconfigurations took a median of 8 months to resolve 50% of findings.",[],{},{"nodeType":1277,"data":1646,"content":1647},{},[1648],{"nodeType":1281,"value":1649,"marks":1650,"data":1651},"Eight months. That's the median timeline for third-party vendors to resolve the identity hygiene issues that create the attack surface in their environments — environments that your data lives in.",[],{},{"nodeType":1277,"data":1653,"content":1654},{},[1655,1659,1667],{"nodeType":1281,"value":1656,"marks":1657,"data":1658},"Extend that posture gap across every vendor and third-party integration, and you start to see why the third-party breach figure keeps climbing. Visibility into",[],{},{"nodeType":1375,"data":1660,"content":1662},{"uri":1661},"https://pushsecurity.com/blog/unpacking-the-vercel-breach/",[1663],{"nodeType":1281,"value":1664,"marks":1665,"data":1666}," OAuth consent flows and third-party integration sprawl",[],{},{"nodeType":1281,"value":1668,"marks":1669,"data":1670}," is the starting point for getting ahead of a supply chain problem that is structurally getting worse.",[],{},{"nodeType":1286,"data":1672,"content":1673},{},[],{"nodeType":1290,"data":1675,"content":1676},{},[1677],{"nodeType":1281,"value":1678,"marks":1679,"data":1681},"AI is scaling known techniques — and creating new blind spots from the inside",[1680],{"type":1297},{},{"nodeType":1277,"data":1683,"content":1684},{},[1685],{"nodeType":1281,"value":1686,"marks":1687,"data":1688},"The DBIR's AI analysis this year is grounded in a collaboration with Anthropic covering 793 threat actors who received enforcement action for violating acceptable use policy between March 2025 and February 2026. The findings are measured rather than alarmist: in the median case, actors sought AI assistance across about 15 distinct ATT&CK techniques, 44% of AI-assisted initial access was phishing-related, and less than 2.5% of techniques observed were classified as rare.",[],{},{"nodeType":1277,"data":1690,"content":1691},{},[1692],{"nodeType":1281,"value":1693,"marks":1694,"data":1695},"AI is currently an operational tool for attackers — automating and scaling known techniques rather than unlocking novel ones. Despite heavy AI-assisted focus on phishing, the DBIR's own incident dataset shows phishing as an initial access vector has barely changed year over year — suggesting AI may be uplifting less-experienced attackers to a higher baseline of lure quality without meaningfully increasing success rates against organizations that already have detection in place.",[],{},{"nodeType":1277,"data":1697,"content":1698},{},[1699],{"nodeType":1281,"value":1700,"marks":1701,"data":1702},"The more concerning number is the 32% of AI-assisted initial access targeting vulnerability exploitation — compounding the patching capacity crisis discussed earlier in a trend that was already accelerating before AI entered the picture.",[],{},{"nodeType":1330,"data":1704,"content":1708},{"target":1705},{"sys":1706},{"id":1707,"type":1335,"linkType":1336},"4bFTnVx1SXMQzZSaICCJOn",[],{"nodeType":1339,"data":1710,"content":1711},{},[1712],{"nodeType":1281,"value":1713,"marks":1714,"data":1716},"Shadow AI is the bigger problem",[1715],{"type":1297},{},{"nodeType":1277,"data":1718,"content":1719},{},[1720,1724,1729],{"nodeType":1281,"value":1721,"marks":1722,"data":1723},"The sharper AI risk for most organizations, though, is internal. Forty-five percent of employees are now regular AI users on corporate devices — up from 15%, a threefold increase — and ",[],{},{"nodeType":1281,"value":1725,"marks":1726,"data":1728},"67% of them use non-corporate accounts",[1727],{"type":1297},{},{"nodeType":1281,"value":1730,"marks":1731,"data":1732},". Shadow AI has become the third most common non-malicious insider action in DLP data, a fourfold increase over the prior year, with source code as the leading data type submitted to unauthorized AI platforms by a wide margin.",[],{},{"nodeType":1277,"data":1734,"content":1735},{},[1736],{"nodeType":1281,"value":1737,"marks":1738,"data":1739},"The browser extension angle is particularly relevant. More than 15% of users had unauthorized AI browser extensions installed, and the DBIR specifically notes that these extensions collect and retain browsing context from internal sites — creating a data exfiltration pathway that operates independently of traditional DLP controls.",[],{},{"nodeType":1277,"data":1741,"content":1742},{},[1743,1747,1755],{"nodeType":1281,"value":1744,"marks":1745,"data":1746},"This is moving faster than any previous shadow IT wave, and the data loss vector is the browser — where users interact with AI tools, where extensions collect context, and where OAuth consent grants connect AI services to corporate data. Visibility and control at that layer isn't a nice-to-have for AI governance;",[],{},{"nodeType":1375,"data":1748,"content":1750},{"uri":1749},"https://pushsecurity.com/blog/browser-extension-management-guide/",[1751],{"nodeType":1281,"value":1752,"marks":1753,"data":1754}," it's the minimum viable starting point",[],{},{"nodeType":1281,"value":1383,"marks":1756,"data":1757},[],{},{"nodeType":1286,"data":1759,"content":1760},{},[],{"nodeType":1290,"data":1762,"content":1763},{},[1764],{"nodeType":1281,"value":1765,"marks":1766,"data":1768},"What this means for defenders",[1767],{"type":1297},{},{"nodeType":1277,"data":1770,"content":1771},{},[1772],{"nodeType":1281,"value":1773,"marks":1774,"data":1775},"The DBIR's 2026 data paints a picture of converging pressures rather than shifting priorities. Vulnerability exploitation surged, but identity-related initial access is broadly stable and credential abuse at 39% across full breach chains remains the single most pervasive technique in the dataset. Phishing is arriving through channels that email gateways can't see. The infostealer-to-ransomware pipeline now has longitudinal data behind it. Third-party involvement keeps climbing because vendor identity hygiene takes months to remediate. And shadow AI is creating data exposure pathways that most security stacks weren't designed to see.",[],{},{"nodeType":1277,"data":1777,"content":1778},{},[1779],{"nodeType":1281,"value":1780,"marks":1781,"data":1782},"The common thread across all of these findings is that the browser — where credentials are entered, sessions are created, OAuth consent is granted, AI tools are accessed, and extensions collect data — is the layer where these risks converge and where defenders need visibility and control if they're going to address them at the point of risk rather than after the fact.",[],{},{"nodeType":1277,"data":1784,"content":1785},{},[1786],{"nodeType":1281,"value":1787,"marks":1788,"data":1789},"Push Security is the most powerful AI-native security tool in the browser. Think EDR, but for the browser — high-fidelity telemetry and real-time control across every session, on every device, with no browser migration required.",[],{},{"nodeType":1277,"data":1791,"content":1792},{},[1793],{"nodeType":1281,"value":1794,"marks":1795,"data":1796},"Security teams use Push to detect and stop advanced browser-based attacks like AiTM phishing, ClickFix, and session hijacking; gain visibility and control over AI tool usage across their workforce; harden identities by surfacing credential reuse, SSO gaps, and shadow IT; and support data loss and insider investigations with browser-layer telemetry that other tools can't see.",[],{},{"nodeType":1277,"data":1798,"content":1799},{},[1800,1803,1813],{"nodeType":1281,"value":29,"marks":1801,"data":1802},[],{},{"nodeType":1375,"data":1804,"content":1806},{"uri":1805},"https://pushsecurity.com/demo",[1807],{"nodeType":1281,"value":1808,"marks":1809,"data":1812},"Book a live demo to learn more.",[1810],{"type":1811},"underline",{},{"nodeType":1281,"value":29,"marks":1814,"data":1815},[],{},{"entries":1817},{"hyperlink":1818,"inline":1819,"block":1820},[],[],[1821,1829,1856,1870,1875,1882],{"sys":1822,"__typename":1823,"title":1824,"caption":1824,"layoutMode":62,"file":1825},{"id":1334},"Image","DBIR Figure 10 (p.15) — Initial access vectors, select enumerations",{"url":1826,"width":1827,"height":1828},"https://images.ctfassets.net/y1cdw1ablpvd/18rPvZ4Sw11UCHE7MxzXkd/17d059302242b4034686b13ee3044c8e/image4.png",1999,1521,{"sys":1830,"__typename":1831,"content":1832,"name":1855,"title":62},{"id":1365},"InsightTextBlockComponent",{"json":1833},{"nodeType":1273,"data":1834,"content":1835},{},[1836],{"nodeType":1277,"data":1837,"content":1838},{},[1839,1843,1851],{"nodeType":1281,"value":1840,"marks":1841,"data":1842},"Some of the",[],{},{"nodeType":1375,"data":1844,"content":1846},{"uri":1845},"https://pushsecurity.com/blog/shinyhunters-the-saas-threat-actor-you-need-to-know-about/",[1847],{"nodeType":1281,"value":1848,"marks":1849,"data":1850}," most consequential identity-based campaigns of the past 12 months",[],{},{"nodeType":1281,"value":1852,"marks":1853,"data":1854}," don't map cleanly to any of these categories — the mass Salesforce campaign that compromised over 1,000 organizations via device code phishing, the Anodot breach chain that pivoted through stored OAuth tokens to reach Snowflake customers, ConsentFix abusing Azure CLI's OAuth flow to bypass MFA entirely.",[],{},"DBIR 2026 IB1",{"sys":1857,"__typename":1831,"content":1858,"name":1869,"title":62},{"id":1471},{"json":1859},{"data":1860,"content":1861,"nodeType":1273},{},[1862],{"data":1863,"content":1864,"nodeType":1277},{},[1865],{"data":1866,"marks":1867,"value":1868,"nodeType":1281},{},[],"The data is a little confusing. The DBIR draws a line between Phishing (asynchronous — send a message and hope for a click) and Pretexting (synchronous — someone interacting with you in real time). Voice phishing over a phone call is Pretexting in VERIS, not Phishing, even though most practitioners would call it phishing. Browser-based credential harvesting delivered via SEO poisoning or malicious downloads falls under \"Baiting.\" So the 16% phishing figure probably understates the full scope of credential-harvesting social engineering as most defenders would define it.","DBIR IB2",{"sys":1871,"__typename":1823,"title":1872,"caption":1872,"layoutMode":62,"file":1873},{"id":1496},"DBIR Figure 54 (p.49) — Median percentage of email attack types by month",{"url":1874,"width":1827,"height":1828},"https://images.ctfassets.net/y1cdw1ablpvd/4eWtJSz2QhM6QgXXjNuBNs/e6a33a088b7b0fb0dd1649c5d9164b53/image1.png",{"sys":1876,"__typename":1823,"title":1877,"caption":1877,"layoutMode":62,"file":1878},{"id":1559},"DBIR Figure 48 (p.45) — Credential leakage events prior to ransomware",{"url":1879,"width":1880,"height":1881},"https://images.ctfassets.net/y1cdw1ablpvd/26NpMQ31lpHgp5x8FrDumz/f022f1ede66b171dd756d28009a7d4a5/image2.png",1772,776,{"sys":1883,"__typename":1823,"title":1884,"caption":1884,"layoutMode":62,"file":1885},{"id":1707},"DBIR Figure 65 (p.60) — Select data types in DLP events targeting generative AI tools",{"url":1886,"width":1827,"height":1828},"https://images.ctfassets.net/y1cdw1ablpvd/584Txvap6FW9GlFlin9GwB/f5f5488251d9faee7fedc3030d2390b1/image5.png","json",{},"What the Verizon DBIR tells us about breaches in 2026","2026-05-20T00:00:00.000Z",{"items":1892},[1893,2499,3388],{"__typename":1894,"sys":1895,"content":1897,"title":2477,"synopsis":2478,"hashTags":62,"publishedDate":2479,"slug":2480,"tagsCollection":2481,"authorsCollection":2491},"BlogPosts",{"id":1896},"217s8zu5idSdX25TUgbPQ1",{"json":1898},{"data":1899,"content":1900,"nodeType":1273},{},[1901,1920,1927,1934,1940,1943,1951,1967,1974,1980,1987,2072,2079,2085,2092,2098,2101,2109,2121,2128,2140,2143,2151,2167,2174,2181,2184,2192,2199,2215,2221,2237,2244,2251,2258,2274,2281,2284,2292,2299,2315,2322,2325,2333,2349,2356,2376,2388,2391,2399,2415,2422,2429,2436,2443,2446,2453,2459],{"data":1902,"content":1903,"nodeType":1277},{},[1904,1908,1916],{"data":1905,"marks":1906,"value":1907,"nodeType":1281},{},[],"The",{"data":1909,"content":1911,"nodeType":1375},{"uri":1910},"https://research.esg-global.com/reportaction/515202191/Marketing",[1912],{"data":1913,"marks":1914,"value":1915,"nodeType":1281},{},[]," Omdia Browser Management and Security report",{"data":1917,"marks":1918,"value":1919,"nodeType":1281},{},[],", based on a survey of 400 IT and security professionals across North America fielded in late 2025, is the most comprehensive industry data to date on how organizations are experiencing, prioritizing, and investing in the secure enterprise browser (SEB) market. ",{"data":1921,"content":1922,"nodeType":1277},{},[1923],{"data":1924,"marks":1925,"value":1926,"nodeType":1281},{},[],"For us at Push, it externally validates what we've known to be true for some time — the browser is where work happens, where attacks land, and where defenders need to be if they want to detect and stop threats before damage is done.",{"data":1928,"content":1929,"nodeType":1277},{},[1930],{"data":1931,"marks":1932,"value":1933,"nodeType":1281},{},[],"We pulled out seven findings that matter most for security teams evaluating their approach.",{"data":1935,"content":1939,"nodeType":1330},{"target":1936},{"sys":1937},{"id":1938,"type":1335,"linkType":1336},"4aM879egIFYmDvOhzyNI9A",[],{"data":1941,"content":1942,"nodeType":1286},{},[],{"data":1944,"content":1945,"nodeType":1290},{},[1946],{"data":1947,"marks":1948,"value":1950,"nodeType":1281},{},[1949],{"type":1297},"1. The attacks driving concern are the ones happening inside the browser session",{"data":1952,"content":1953,"nodeType":1277},{},[1954,1958,1963],{"data":1955,"marks":1956,"value":1957,"nodeType":1281},{},[],"The threat picture is driving everything else in this report, so it's the right place to start. ",{"data":1959,"marks":1960,"value":1962,"nodeType":1281},{},[1961],{"type":1297},"49% of organizations suffered a successful browser-based attack in the last 12 months.",{"data":1964,"marks":1965,"value":1966,"nodeType":1281},{},[]," Among those affected, browser-originated incidents account for roughly 37% of all security incidents — and 68% say that share has grown over the past two years. ",{"data":1968,"content":1969,"nodeType":1277},{},[1970],{"data":1971,"marks":1972,"value":1973,"nodeType":1281},{},[],"The browser is not an emerging threat vector. It’s worth noting here that these numbers are also likely lower than the reality, since many are only identified later in the kill chain. Without browser-level telemetry they can be difficult to trace back their source — which in the vast majority of cases, even for malware-driven attacks, is the browser. ",{"data":1975,"content":1979,"nodeType":1330},{"target":1976},{"sys":1977},{"id":1978,"type":1335,"linkType":1336},"6Kcz8oILKVHmhQIo5Du6V",[],{"data":1981,"content":1982,"nodeType":1277},{},[1983],{"data":1984,"marks":1985,"value":1986,"nodeType":1281},{},[],"What stands out is that every one of the top attack categories plays out inside the browser session itself — not against the browser as a piece of software, but within the sessions where users interact with applications:",{"data":1988,"content":1989,"nodeType":2071},{},[1990,2001,2011,2021,2031,2041,2051,2061],{"data":1991,"content":1992,"nodeType":2000},{},[1993],{"data":1994,"content":1995,"nodeType":1277},{},[1996],{"data":1997,"marks":1998,"value":1999,"nodeType":1281},{},[],"Phishing (40%)","list-item",{"data":2002,"content":2003,"nodeType":2000},{},[2004],{"data":2005,"content":2006,"nodeType":1277},{},[2007],{"data":2008,"marks":2009,"value":2010,"nodeType":1281},{},[],"Data loss or leakage (38%)",{"data":2012,"content":2013,"nodeType":2000},{},[2014],{"data":2015,"content":2016,"nodeType":1277},{},[2017],{"data":2018,"marks":2019,"value":2020,"nodeType":1281},{},[],"Malicious browser extensions (34%)",{"data":2022,"content":2023,"nodeType":2000},{},[2024],{"data":2025,"content":2026,"nodeType":1277},{},[2027],{"data":2028,"marks":2029,"value":2030,"nodeType":1281},{},[],"Vulnerable browser extensions (33%)",{"data":2032,"content":2033,"nodeType":2000},{},[2034],{"data":2035,"content":2036,"nodeType":1277},{},[2037],{"data":2038,"marks":2039,"value":2040,"nodeType":1281},{},[],"Malicious scripts (31%)",{"data":2042,"content":2043,"nodeType":2000},{},[2044],{"data":2045,"content":2046,"nodeType":1277},{},[2047],{"data":2048,"marks":2049,"value":2050,"nodeType":1281},{},[],"Credential theft via browser (28%)",{"data":2052,"content":2053,"nodeType":2000},{},[2054],{"data":2055,"content":2056,"nodeType":1277},{},[2057],{"data":2058,"marks":2059,"value":2060,"nodeType":1281},{},[],"Cookie theft (22%)",{"data":2062,"content":2063,"nodeType":2000},{},[2064],{"data":2065,"content":2066,"nodeType":1277},{},[2067],{"data":2068,"marks":2069,"value":2070,"nodeType":1281},{},[],"AiTM attacks (17%)","unordered-list",{"data":2073,"content":2074,"nodeType":1277},{},[2075],{"data":2076,"marks":2077,"value":2078,"nodeType":1281},{},[],"Phishing, credential theft, cookie theft, and AiTM are attacks that target the user's interaction with a web page — the credential entry, the session creation, the token exchange. Malicious and vulnerable extensions are supply chain risks that operate inside the browser's own execution environment. Data loss happens through the browser when employees upload files, paste data into AI tools, or share information with unsanctioned applications. ",{"data":2080,"content":2084,"nodeType":1330},{"target":2081},{"sys":2082},{"id":2083,"type":1335,"linkType":1336},"5Kw2kSrL8u4VyslxK8HCtR",[],{"data":2086,"content":2087,"nodeType":1277},{},[2088],{"data":2089,"marks":2090,"value":2091,"nodeType":1281},{},[],"None of these are attacks where network-layer traffic inspection, endpoint monitoring, or email scanning provides complete coverage, because the attack surface is the browser session itself.",{"data":2093,"content":2097,"nodeType":1330},{"target":2094},{"sys":2095},{"id":2096,"type":1335,"linkType":1336},"5kI5h4Z31ByD73er7voayF",[],{"data":2099,"content":2100,"nodeType":1286},{},[],{"data":2102,"content":2103,"nodeType":1290},{},[2104],{"data":2105,"marks":2106,"value":2108,"nodeType":1281},{},[2107],{"type":1297},"2. Browser security is now a board-level priority",{"data":2110,"content":2111,"nodeType":1277},{},[2112,2117],{"data":2113,"marks":2114,"value":2116,"nodeType":1281},{},[2115],{"type":1297},"88% of respondents rank browser security as at least a top-five security priority",{"data":2118,"marks":2119,"value":2120,"nodeType":1281},{},[],", with more than a quarter (26%) calling it their single top priority. For context, this is a survey that covers the full spectrum of security concerns — cloud, supply chain, AI, insider risk — and browser security has risen above most of them.",{"data":2122,"content":2123,"nodeType":1277},{},[2124],{"data":2125,"marks":2126,"value":2127,"nodeType":1281},{},[],"This is not aspirational interest. The correlation between priority level and investment is sharp: among those who rank browser security as their top priority, 72% have significantly increased their investment due to emerging threats. Among those who rank it in their top five, that figure is 26%. The organizations that care most are spending the most.",{"data":2129,"content":2130,"nodeType":1277},{},[2131,2136],{"data":2132,"marks":2133,"value":2135,"nodeType":1281},{},[2134],{"type":1297},"86% of respondents have increased their browser security investment in response to emerging threats",{"data":2137,"marks":2138,"value":2139,"nodeType":1281},{},[],", with 36% saying the increase was significant. When you ask what's driving that spend, the answer is the threat landscape: the attacks cataloged in the previous section are the reason budgets are moving.",{"data":2141,"content":2142,"nodeType":1286},{},[],{"data":2144,"content":2145,"nodeType":1290},{},[2146],{"data":2147,"marks":2148,"value":2150,"nodeType":1281},{},[2149],{"type":1297},"3. Real budget is being allocated — and it's growing",{"data":2152,"content":2153,"nodeType":1277},{},[2154,2158,2163],{"data":2155,"marks":2156,"value":2157,"nodeType":1281},{},[],"Secure enterprise browser solutions already take up ",{"data":2159,"marks":2160,"value":2162,"nodeType":1281},{},[2161],{"type":1297},"12.6% of the average security budget",{"data":2164,"marks":2165,"value":2166,"nodeType":1281},{},[]," — a substantial allocation for a category that didn't exist as a standalone line item a few years ago. And 85% of respondents expect to increase that spend over the next 12–24 months, with a quarter expecting significant increases.",{"data":2168,"content":2169,"nodeType":1277},{},[2170],{"data":2171,"marks":2172,"value":2173,"nodeType":1281},{},[],"Where the money comes from tells its own story. The most common funding model is a discrete line item within security program budgets (31%) or a dedicated secure browsing budget (30%). When organizations pull from an existing program budget, web security (26%) and endpoint security (21%) are the most common sources — while SASE/SSE accounts for just 9%, despite SASE vendors being the second most popular vendor category. That disconnect between vendor preference and budget origin suggests the SASE-bundled buying motion may be more aspirational than operational.",{"data":2175,"content":2176,"nodeType":1277},{},[2177],{"data":2178,"marks":2179,"value":2180,"nodeType":1281},{},[],"IT operations leadership is the top stakeholder in 82% of evaluations, with CISO and security leadership at 64% and CIOs at 42%. Day-to-day management sits primarily with IT Ops (77%) and SecOps (50%). This dual stakeholder picture — IT operations driving evaluation, security leadership providing strategic direction — shapes the competitive landscape in ways we'll come back to.",{"data":2182,"content":2183,"nodeType":1286},{},[],{"data":2185,"content":2186,"nodeType":1290},{},[2187],{"data":2188,"marks":2189,"value":2191,"nodeType":1281},{},[2190],{"type":1297},"4. AI is accelerating both the threat and the use case",{"data":2193,"content":2194,"nodeType":1277},{},[2195],{"data":2196,"marks":2197,"value":2198,"nodeType":1281},{},[],"AI shows up in this report from two directions, mirroring how it is reshaping the security landscape itself.",{"data":2200,"content":2201,"nodeType":1277},{},[2202,2206,2211],{"data":2203,"marks":2204,"value":2205,"nodeType":1281},{},[],"On the threat side, ",{"data":2207,"marks":2208,"value":2210,"nodeType":1281},{},[2209],{"type":1297},"AI-powered targeted phishing and social engineering is the top emerging concern",{"data":2212,"marks":2213,"value":2214,"nodeType":1281},{},[],", cited by 75% of respondents as either very concerning or concerning. Data leakage via unsanctioned AI applications comes second at 71%, followed by deepfake/AI-generated malicious content at 69% and credential harvesting via fake AI or SaaS login pages at 66%. Every one of these threat categories involves the browser — AI-enhanced phishing lands in the browser, AI data leakage happens through browser-based AI tools, and fake AI login pages are browser-based credential harvesting.",{"data":2216,"content":2220,"nodeType":1330},{"target":2217},{"sys":2218},{"id":2219,"type":1335,"linkType":1336},"2ajv2i5wn2GzKuyynQGlvq",[],{"data":2222,"content":2223,"nodeType":1277},{},[2224,2228,2233],{"data":2225,"marks":2226,"value":2227,"nodeType":1281},{},[],"On the adoption side, the picture is almost universal — and almost universally under-governed. ",{"data":2229,"marks":2230,"value":2232,"nodeType":1281},{},[2231],{"type":1297},"92% of organizations now allow employees to use public GenAI applications",{"data":2234,"marks":2235,"value":2236,"nodeType":1281},{},[],", and virtually every organization has some kind of policy position: 37% have sanctioned one public app (with everything else unsanctioned), 39% have sanctioned multiple public apps (with others unsanctioned), and 23% restrict employees to a corporate instance while the public versions are unsanctioned. ",{"data":2238,"content":2239,"nodeType":1277},{},[2240],{"data":2241,"marks":2242,"value":2243,"nodeType":1281},{},[],"Even the 8% who don't allow GenAI at all have taken a policy position. Essentially 100% of organizations have a GenAI policy — but for the vast majority, that policy designates a large portion of public AI tool usage as unsanctioned, which raises the immediate question of whether they have the tooling to actually enforce it.",{"data":2245,"content":2246,"nodeType":1277},{},[2247],{"data":2248,"marks":2249,"value":2250,"nodeType":1281},{},[],"The answer, based on the current tooling landscape, appears to be: not quite. When Omdia asked how organizations currently secure GenAI usage, 58% rely on secure web gateways — tools that see traffic metadata but cannot observe what a user actually does inside a GenAI session — while 57% use secure browsing solutions and 57% use SaaS security solutions. ",{"data":2252,"content":2253,"nodeType":1277},{},[2254],{"data":2255,"marks":2256,"value":2257,"nodeType":1281},{},[],"An SWG can tell you that a user visited ChatGPT, but it cannot tell you whether they pasted your company's source code into the prompt. That distinction — between knowing where data went and knowing what the user actually did — is the fundamental gap that browser-layer visibility exists to close, and it is exactly the gap that makes GenAI policies unenforceable without browser-layer tooling.",{"data":2259,"content":2260,"nodeType":1277},{},[2261,2265,2270],{"data":2262,"marks":2263,"value":2264,"nodeType":1281},{},[],"The use case data reflects this. When Omdia asked about the most important use cases for a secure browsing solution, ",{"data":2266,"marks":2267,"value":2269,"nodeType":1281},{},[2268],{"type":1297},"generative AI application security came in first at 59%",{"data":2271,"marks":2272,"value":2273,"nodeType":1281},{},[],", followed by data loss prevention at 51% and general web security enhancement at 42%. The feature priorities tell a consistent story: AI-powered threat detection and response (52%) and advanced GenAI usage controls and monitoring (41%) were the top two capabilities organizations said would be most important in a purchase decision. ",{"data":2275,"content":2276,"nodeType":1277},{},[2277],{"data":2278,"marks":2279,"value":2280,"nodeType":1281},{},[],"AI is both the top threat concern and the top use case for browser security — and it is a browser problem at both ends, because every LLM interaction, every prompt containing sensitive data, and every AI agent authorization happens inside a browser session.",{"data":2282,"content":2283,"nodeType":1286},{},[],{"data":2285,"content":2286,"nodeType":1290},{},[2287],{"data":2288,"marks":2289,"value":2291,"nodeType":1281},{},[2290],{"type":1297},"5. Organizations that have deployed secure enterprise browser solutions are seeing real results",{"data":2293,"content":2294,"nodeType":1277},{},[2295],{"data":2296,"marks":2297,"value":2298,"nodeType":1281},{},[],"One of the most useful sections in Omdia's report is the benefits data — what organizations that have deployed SEB solutions are actually getting out of them.",{"data":2300,"content":2301,"nodeType":1277},{},[2302,2306,2311],{"data":2303,"marks":2304,"value":2305,"nodeType":1281},{},[],"The top realized benefit is ",{"data":2307,"marks":2308,"value":2310,"nodeType":1281},{},[2309],{"type":1297},"improved data security, cited by 58% of respondents",{"data":2312,"marks":2313,"value":2314,"nodeType":1281},{},[],", followed by fewer security incidents (49%), better visibility and auditing (47%), improved user experience (44%), and simplified configuration and policy management (41%). The picture that emerges is not just a security story but an operational one: organizations are seeing fewer incidents, better visibility, and simpler management alongside the security outcomes.",{"data":2316,"content":2317,"nodeType":1277},{},[2318],{"data":2319,"marks":2320,"value":2321,"nodeType":1281},{},[],"The 49% who cite fewer security incidents as a realized benefit is the number that matters most here, because it directly connects SEB deployment to measurable risk reduction. Organizations aren't just buying tools and hoping — they're deploying them and seeing fewer successful attacks as a result.",{"data":2323,"content":2324,"nodeType":1286},{},[],{"data":2326,"content":2327,"nodeType":1290},{},[2328],{"data":2329,"marks":2330,"value":2332,"nodeType":1281},{},[2331],{"type":1297},"6. The market wants protection in existing browsers, not migration",{"data":2334,"content":2335,"nodeType":1277},{},[2336,2340,2345],{"data":2337,"marks":2338,"value":2339,"nodeType":1281},{},[],"When Omdia asked what attributes matter most in a secure enterprise browser solution, ",{"data":2341,"marks":2342,"value":2344,"nodeType":1281},{},[2343],{"type":1297},"\"ability to use existing browsers\" ranked as the fourth most important attribute at 48%",{"data":2346,"marks":2347,"value":2348,"nodeType":1281},{},[]," — behind only integration with other security tools (57%), controls over generative AI application usage (53%), and centralized policy enforcement (52%). ",{"data":2350,"content":2351,"nodeType":1277},{},[2352],{"data":2353,"marks":2354,"value":2355,"nodeType":1281},{},[],"That 48% figure, combined with 80% of respondents saying they expect to use an SEB solution as an integrated or alongside component rather than a replacement for existing tools, points to a clear market preference: organizations want browser security that works with their existing browser estate, not a migration to a new one.",{"data":2357,"content":2358,"nodeType":1277},{},[2359,2363,2372],{"data":2360,"marks":2361,"value":2362,"nodeType":1281},{},[],"This is consistent with what we hear from security leaders directly. As ",{"data":2364,"content":2366,"nodeType":1375},{"uri":2365},"https://pushsecurity.com/customer-stories",[2367],{"data":2368,"marks":2369,"value":2371,"nodeType":1281},{},[2370],{"type":1811},"Josh Lemos put it: ",{"data":2373,"marks":2374,"value":2375,"nodeType":1281},{},[],"\"We looked at the full-stack enterprise browser approach, but converging on a single platform was tough. Push gave me the security instrumentation and context I needed without onerous headwinds.\" The deployment model matters because it determines adoption velocity — and a tool that requires browser migration introduces friction that delays time to value.",{"data":2377,"content":2378,"nodeType":1277},{},[2379,2383],{"data":2380,"marks":2381,"value":2382,"nodeType":1281},{},[],"Push was built around this insight from day one. As the secure enterprise browser extension for security teams, Push turns any browser — managed or unmanaged, including agentic browsers — into a telemetry source and control point the moment it's installed. It has been rolled out to 100,000 users in under an hour during normal office hours with zero downtime. ",{"data":2384,"marks":2385,"value":2387,"nodeType":1281},{},[2386],{"type":1297},"That is a deployment model that matches what Omdia's respondents are asking for.",{"data":2389,"content":2390,"nodeType":1286},{},[],{"data":2392,"content":2393,"nodeType":1290},{},[2394],{"data":2395,"marks":2396,"value":2398,"nodeType":1281},{},[2397],{"type":1297},"7. Dedicated vendors lead over platform plays",{"data":2400,"content":2401,"nodeType":1277},{},[2402,2406,2411],{"data":2403,"marks":2404,"value":2405,"nodeType":1281},{},[],"When Omdia asked which category of vendor organizations primarily use or expect to use for secure enterprise browsing, ",{"data":2407,"marks":2408,"value":2410,"nodeType":1281},{},[2409],{"type":1297},"36% chose a dedicated SEB vendor",{"data":2412,"marks":2413,"value":2414,"nodeType":1281},{},[]," — the largest single category. SASE/network security vendors came second at 29%, followed by traditional VDI/desktop virtualization vendors at 19% and endpoint platform vendors at 15%.",{"data":2416,"content":2417,"nodeType":1277},{},[2418],{"data":2419,"marks":2420,"value":2421,"nodeType":1281},{},[],"The dedicated category leads, and the reason isn't just first-mover advantage — it's architectural. The alternative paths each come with structural constraints. SASE and SSE platforms are network-centric: they see traffic metadata and enforce URL categorization, but they can't observe the rendered page inside a browser tab — the DOM structure, the script behavior, the credential entry that distinguishes a legitimate login from an AiTM reverse-proxy kit. ",{"data":2423,"content":2424,"nodeType":1277},{},[2425],{"data":2426,"marks":2427,"value":2428,"nodeType":1281},{},[],"Endpoint platforms that bolt on browser visibility are still anchored to the OS layer, solving for browser exploit prevention rather than in-session behavioral detection of the attacks that actually dominate — phishing, credential theft, session hijacking, extension compromise. And when large platform vendors acquire browser security capabilities, the integration work takes years rather than months, during which detection depth sits in a transitional state. ",{"data":2430,"content":2431,"nodeType":1277},{},[2432],{"data":2433,"marks":2434,"value":2435,"nodeType":1281},{},[],"Dedicated browser-native vendors start from a different premise entirely: the browser isn't a supplementary signal feeding into someone else's SASE pipeline or XDR correlation engine — it is the telemetry source and the control point. The browser is the only place where you get simultaneous visibility into both the attacker's technique and the employee's action within the same session, because the phishing page, the credential submission, the token exchange, and the data exfiltration all happen inside the same tab. No network appliance, endpoint agent, or identity provider log can see all of that, because none of them are present where the interaction occurs.",{"data":2437,"content":2438,"nodeType":1277},{},[2439],{"data":2440,"marks":2441,"value":2442,"nodeType":1281},{},[],"For security teams evaluating SEB solutions, the architecture matters more than the vendor category label. The capabilities Omdia's respondents ranked highest — integration with existing tools, GenAI controls, centralized policy enforcement, and the ability to use existing browsers — all point toward solutions that deliver detection depth through a lightweight deployment model, without browser migration and without the integration debt of a platform acquisition.",{"data":2444,"content":2445,"nodeType":1286},{},[],{"data":2447,"content":2448,"nodeType":1277},{},[2449],{"data":2450,"marks":2451,"value":2452,"nodeType":1281},{},[],"Push Security is the most powerful AI-native security tool in the browser. Think EDR, but for the browser — high-fidelity telemetry and real-time control across every session, on every device, with no browser migration required. ",{"data":2454,"content":2455,"nodeType":1277},{},[2456],{"data":2457,"marks":2458,"value":1794,"nodeType":1281},{},[],{"data":2460,"content":2461,"nodeType":1277},{},[2462,2465,2473],{"data":2463,"marks":2464,"value":29,"nodeType":1281},{},[],{"data":2466,"content":2467,"nodeType":1375},{"uri":1805},[2468],{"data":2469,"marks":2470,"value":2472,"nodeType":1281},{},[2471],{"type":1811},"Book a live demo",{"data":2474,"marks":2475,"value":2476,"nodeType":1281},{},[]," to learn more.","7 things Omdia's latest report tells us about the secure enterprise browser market","Unpacking the latest research report from Omdia and what it means for the secure enterprise browser market.","2026-05-13T00:00:00.000Z","7-things-omdias-latest-report-tells-us-about-the-secure-enterprise-browser-market",{"items":2482},[2483,2487],{"sys":2484,"name":2486},{"id":2485},"3pjES4THCIfSAwhGdNwBcy","Browser security",{"sys":2488,"name":2490},{"id":2489},"1gZi8NrRy2v9OqPV7C4dwD","Risk management",{"items":2492},[2493],{"fullName":2494,"firstName":2495,"jobTitle":2496,"profilePicture":2497},"Dan Green","Dan","Threat Research",{"url":2498},"https://images.ctfassets.net/y1cdw1ablpvd/7jik1VhFgA3kgzXBXTm2Vw/fcd8c171da644903d0827eafcfbcaad0/Dan_Headshot_2025.png",{"__typename":1894,"sys":2500,"content":2502,"title":3370,"synopsis":3371,"hashTags":62,"publishedDate":3372,"slug":3373,"tagsCollection":3374,"authorsCollection":3384},{"id":2501},"3jF1fypt08TNlSoWuoMWhj",{"json":2503},{"nodeType":1273,"data":2504,"content":2505},{},[2506,2525,2568,2575,2606,2649,2655,2667,2670,2678,2731,2738,2761,2767,2770,2778,2807,2814,2822,2828,2831,2839,2846,2864,2871,2913,2920,2923,2931,2950,2958,2965,2988,3011,3035,3043,3050,3053,3060,3066,3082,3085,3093,3111,3364],{"nodeType":1277,"data":2507,"content":2508},{},[2509,2513,2521],{"nodeType":1281,"value":2510,"marks":2511,"data":2512},"ShinyHunters and the broader SLH (",[],{},{"nodeType":1375,"data":2514,"content":2516},{"uri":2515},"https://pushsecurity.com/blog/scattered-lapsus-hunters/",[2517],{"nodeType":1281,"value":2518,"marks":2519,"data":2520},"Scattered Lapsus$ Hunters",[],{},{"nodeType":1281,"value":2522,"marks":2523,"data":2524},") collective have claimed breaches at thousands of organizations over the past twelve months across retail, technology, aviation, financial services, media, gaming, and education, in what amounts to the most sustained data theft and extortion operation in recent cybercrime history. ",[],{},{"nodeType":1277,"data":2526,"content":2527},{},[2528,2532,2540,2544,2552,2556,2564],{"nodeType":1281,"value":2529,"marks":2530,"data":2531},"The confirmed victim list reads like a Fortune 500 directory: Coca-Cola, Cisco, Qantas, Coinbase, ADT, Aflac, SoundCloud, Rockstar Games, and recently ",[],{},{"nodeType":1375,"data":2533,"content":2535},{"uri":2534},"https://www.bleepingcomputer.com/news/security/instructure-confirms-data-breach-shinyhunters-claims-attack/",[2536],{"nodeType":1281,"value":2537,"marks":2538,"data":2539},"Instructure",[],{},{"nodeType":1281,"value":2541,"marks":2542,"data":2543}," — whose breach ",[],{},{"nodeType":1375,"data":2545,"content":2547},{"uri":2546},"https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/",[2548],{"nodeType":1281,"value":2549,"marks":2550,"data":2551},"disrupted schools and universities nationwide",[],{},{"nodeType":1281,"value":2553,"marks":2554,"data":2555}," during final exams — among dozens more named publicly and likely many more that haven't been (breaches settled quickly behind closed doors don't always make it into the public eye). ShinyHunters alone claimed over 1.5 billion stolen Salesforce records from a single campaign targeting more than 1,000 organizations, and this follows the ",[],{},{"nodeType":1375,"data":2557,"content":2559},{"uri":2558},"https://www.bleepingcomputer.com/news/security/shinyhunters-claims-15-billion-salesforce-records-stolen-in-drift-hacks/",[2560],{"nodeType":1281,"value":2561,"marks":2562,"data":2563},"2024 Snowflake breach",[],{},{"nodeType":1281,"value":2565,"marks":2566,"data":2567}," where the same group used infostealer-harvested credentials to compromise over 165 customer environments (and another billion-plus records).",[],{},{"nodeType":1277,"data":2569,"content":2570},{},[2571],{"nodeType":1281,"value":2572,"marks":2573,"data":2574},"SLH operates as a distributed criminal collective. Its genealogy traces through a merger of Scattered Spider, Lapsus$, and ShinyHunters, itself part of the Com, a broader community of English-speaking cybercriminals with international criminal affiliations. ",[],{},{"nodeType":1277,"data":2576,"content":2577},{},[2578,2582,2590,2594,2602],{"nodeType":1281,"value":2579,"marks":2580,"data":2581},"Additional operating clusters, including Cordial Spider and Snarky Spider (which CrowdStrike ",[],{},{"nodeType":1375,"data":2583,"content":2585},{"uri":2584},"https://cyberscoop.com/crowdstrike-cordial-spider-snarky-spider-extortion-attacks/",[2586],{"nodeType":1281,"value":2587,"marks":2588,"data":2589},"characterizes as the new generation of Scattered Spider",[],{},{"nodeType":1281,"value":2591,"marks":2592,"data":2593},") run parallel campaigns against different target sectors, unified not by shared infrastructure but by a shared playbook of techniques that exploit the structural weakness in modern SaaS-first organizations. ",[],{},{"nodeType":1375,"data":2595,"content":2597},{"uri":2596},"https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2026-03-12-Vishing-Campaigns-Lead-to-Data-Theft-and-Extortion.txt",[2598],{"nodeType":1281,"value":2599,"marks":2600,"data":2601},"Unit 42 documented",[],{},{"nodeType":1281,"value":2603,"marks":2604,"data":2605}," these groups moving from initial compromise to complete data exfiltration in under an hour — faster than most organizations can even begin to respond. ",[],{},{"nodeType":1277,"data":2607,"content":2608},{},[2609,2613,2621,2625,2633,2637,2645],{"nodeType":1281,"value":2610,"marks":2611,"data":2612},"Not every SLH breach is browser-based — the Instructure breach (275 million individuals, ~330 school login portals defaced) began with a Salesforce tenant compromise in September 2025, but resurfaced in May 2026 after attackers exploited a ",[],{},{"nodeType":1375,"data":2614,"content":2616},{"uri":2615},"https://www.bitdefender.com/en-gb/blog/businessinsights/technical-advisory-shinyhunters-breach-instructure-canvas-lms",[2617],{"nodeType":1281,"value":2618,"marks":2619,"data":2620},"vulnerability affecting Canvas's Free-For-Teacher program",[],{},{"nodeType":1281,"value":2622,"marks":2623,"data":2624}," (it's now been confirmed that Instructure \"",[],{},{"nodeType":1375,"data":2626,"content":2628},{"uri":2627},"https://www.instructure.com/incident_update",[2629],{"nodeType":1281,"value":2630,"marks":2631,"data":2632},"reached a settlement",[],{},{"nodeType":1281,"value":2634,"marks":2635,"data":2636},"\" for the deletion of the data, and shut down the free account tier), while the Coinbase breach cost ",[],{},{"nodeType":1375,"data":2638,"content":2640},{"uri":2639},"https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/",[2641],{"nodeType":1281,"value":2642,"marks":2643,"data":2644},"$180M–400M through insider bribery",[],{},{"nodeType":1281,"value":2646,"marks":2647,"data":2648}," — but these are the exceptions that prove the rule. ",[],{},{"nodeType":1330,"data":2650,"content":2654},{"target":2651},{"sys":2652},{"id":2653,"type":1335,"linkType":1336},"4qNrbDyMJIumQfdbh9YVkU",[],{"nodeType":1277,"data":2656,"content":2657},{},[2658,2663],{"nodeType":1281,"value":2659,"marks":2660,"data":2662},"The vast majority of SLH campaigns over the past year converge on three browser-based attack vectors: vishing combined with AiTM phishing, device code phishing exploiting account authorization flows, and OAuth supply chain attacks through compromised third-party integrators.",[2661],{"type":1297},{},{"nodeType":1281,"value":2664,"marks":2665,"data":2666}," Each is well-documented, each has produced confirmed victims at scale, and each is detectable or preventable through browser-layer security controls. This post examines all three.",[],{},{"nodeType":1286,"data":2668,"content":2669},{},[],{"nodeType":1290,"data":2671,"content":2672},{},[2673],{"nodeType":1281,"value":2674,"marks":2675,"data":2677},"Vector 1: Vishing combined with AiTM phishing",[2676],{"type":1297},{},{"nodeType":1277,"data":2679,"content":2680},{},[2681,2685,2693,2697,2705,2709,2716,2720,2728],{"nodeType":1281,"value":2682,"marks":2683,"data":2684},"The most visible campaign right now pairs targeted voice calls with adversary-in-the-middle phishing pages — an approach that",[],{},{"nodeType":1375,"data":2686,"content":2688},{"uri":2687},"https://cloud.google.com/blog/topics/threat-intelligence/expansion-shinyhunters-saas-data-theft",[2689],{"nodeType":1281,"value":2690,"marks":2691,"data":2692}," Mandiant",[],{},{"nodeType":1281,"value":2694,"marks":2695,"data":2696},",",[],{},{"nodeType":1375,"data":2698,"content":2700},{"uri":2699},"https://www.crowdstrike.com/en-us/blog/defending-against-cordial-spider-and-snarky-spider-with-falcon-shield/",[2701],{"nodeType":1281,"value":2702,"marks":2703,"data":2704}," CrowdStrike",[],{},{"nodeType":1281,"value":2706,"marks":2707,"data":2708},", and",[],{},{"nodeType":1375,"data":2710,"content":2711},{"uri":2596},[2712],{"nodeType":1281,"value":2713,"marks":2714,"data":2715}," Unit 42",[],{},{"nodeType":1281,"value":2717,"marks":2718,"data":2719}," have all documented from the incident response side, and which Push has",[],{},{"nodeType":1375,"data":2721,"content":2723},{"uri":2722},"https://pushsecurity.com/blog/inside-criminal-phishing-panel/",[2724],{"nodeType":1281,"value":2725,"marks":2726,"data":2727}," documented from inside the attacker's own operator panels",[],{},{"nodeType":1281,"value":1383,"marks":2729,"data":2730},[],{},{"nodeType":1277,"data":2732,"content":2733},{},[2734],{"nodeType":1281,"value":2735,"marks":2736,"data":2737},"An attacker impersonating IT support calls the target employee, establishes urgency — often citing a \"mandatory passkey rollout\" or a \"security compliance update\" — and directs them to a victim-branded AiTM phishing page (typically at a domain like \u003Ccompany>sso.com or \u003Ccompany>internal.com). The attack is processed by a live human in real time, relaying credentials and MFA codes to the legitimate identity provider as they are entered, capturing the resulting session token, and granting the attacker an authenticated session. ",[],{},{"nodeType":1277,"data":2739,"content":2740},{},[2741,2745,2752,2756],{"nodeType":1281,"value":2742,"marks":2743,"data":2744},"One of the reasons that this method is becoming so widespread is the commoditization of effective tools. Push's ",[],{},{"nodeType":1375,"data":2746,"content":2747},{"uri":2722},[2748],{"nodeType":1281,"value":2749,"marks":2750,"data":2751},"infiltration of the criminal phishing panels",[],{},{"nodeType":1281,"value":2753,"marks":2754,"data":2755}," identified over 400 linked domains across four distinct infrastructure clusters. ",[],{},{"nodeType":1281,"value":2757,"marks":2758,"data":2760},"This mirrors the pattern that turned AiTM phishing from a specialist capability into an industrialized market with competing PhaaS platforms, but with the added complication that voice phishing as the delivery vector makes the attack invisible to traditional anti-phishing controls at the email layer.",[2759],{"type":1297},{},{"nodeType":1330,"data":2762,"content":2766},{"target":2763},{"sys":2764},{"id":2765,"type":1335,"linkType":1336},"1Yhthl0PILGW7EmCcZUrNv",[],{"nodeType":1286,"data":2768,"content":2769},{},[],{"nodeType":1290,"data":2771,"content":2772},{},[2773],{"nodeType":1281,"value":2774,"marks":2775,"data":2777},"Vector 2: Vishing combined with device code phishing",[2776],{"type":1297},{},{"nodeType":1277,"data":2779,"content":2780},{},[2781,2784,2792,2796,2803],{"nodeType":1281,"value":1907,"marks":2782,"data":2783},[],{},{"nodeType":1375,"data":2785,"content":2787},{"uri":2786},"https://pushsecurity.com/blog/unpacking-the-latest-slh-campaign/",[2788],{"nodeType":1281,"value":2789,"marks":2790,"data":2791}," ShinyHunters Salesforce campaign",[],{},{"nodeType":1281,"value":2793,"marks":2794,"data":2795}," that ran through 2025 and into 2026 used device code phishing as one of its core methods,",[],{},{"nodeType":1375,"data":2797,"content":2798},{"uri":2558},[2799],{"nodeType":1281,"value":2800,"marks":2801,"data":2802}," compromising over 1,000 organizations and claiming 1.5 billion stolen records",[],{},{"nodeType":1281,"value":2804,"marks":2805,"data":2806}," — including an attempted extortion of Salesforce itself. The attack involved registering an attacker-controlled \"DataLoader\" application mimicking a legitimate Salesforce tool, configuring it to request broad OAuth scopes including full API access and refresh token generation, and guiding victims through the device authorization flow via vishing calls.",[],{},{"nodeType":1277,"data":2808,"content":2809},{},[2810],{"nodeType":1281,"value":2811,"marks":2812,"data":2813},"Device code phishing exploits the OAuth 2.0 device authorization grant — a flow designed for devices without browsers, like smart TVs, but used in a wide range of scenarios including CLI logins — by tricking users into entering a code on Microsoft's (or another identity provider's) legitimate verification page. Since the victim is usually signed into the app in their browser, there’s no login at all. They simply navigate to the app’s device code login page and enter an attacker-provided code to grant the attacker an access token. ",[],{},{"nodeType":1277,"data":2815,"content":2816},{},[2817],{"nodeType":1281,"value":2818,"marks":2819,"data":2821},"This is what makes device code phishing structurally different from AiTM: it defeats all MFA (including passkeys) because the attack doesn’t target the login, but the authorization layer instead.",[2820],{"type":1297},{},{"nodeType":1330,"data":2823,"content":2827},{"target":2824},{"sys":2825},{"id":2826,"type":1335,"linkType":1336},"3ElQz8sLATnR8RY5nVlBGM",[],{"nodeType":1286,"data":2829,"content":2830},{},[],{"nodeType":1290,"data":2832,"content":2833},{},[2834],{"nodeType":1281,"value":2835,"marks":2836,"data":2838},"Vector 3: OAuth supply chain attacks through compromised integrators",[2837],{"type":1297},{},{"nodeType":1277,"data":2840,"content":2841},{},[2842],{"nodeType":1281,"value":2843,"marks":2844,"data":2845},"The third vector does not require the attacker to phish the victim organization's employees at all. Instead, it exploits the OAuth trust relationships that organizations create when they connect third-party SaaS vendors into their environments — and the consequence is that every organization that authorized one of these integrations effectively extended its security boundary to include the vendor's own security posture.",[],{},{"nodeType":1277,"data":2847,"content":2848},{},[2849,2852,2860],{"nodeType":1281,"value":1907,"marks":2850,"data":2851},[],{},{"nodeType":1375,"data":2853,"content":2855},{"uri":2854},"https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift",[2856],{"nodeType":1281,"value":2857,"marks":2858,"data":2859}," Salesloft/Drift supply chain attack",[],{},{"nodeType":1281,"value":2861,"marks":2862,"data":2863}," demonstrated this at scale in 2025: in an extension of the previously mentioned device code phishing campaign, the attacker compromised Salesloft's GitHub environment, used TruffleHog to find secrets, stole Drift OAuth tokens, and used them to access downstream Salesforce environments. The same pattern was later repeated at Gainsight. ",[],{},{"nodeType":1277,"data":2865,"content":2866},{},[2867],{"nodeType":1281,"value":2868,"marks":2869,"data":2870},"Along with the previously mentioned device code phishing attacks,  more than 1000 organizations were breached. The attackers then harvested AWS keys, Snowflake credentials, and stored passwords from breached Salesforce instances, compounding the access into progressively wider reach.",[],{},{"nodeType":1277,"data":2872,"content":2873},{},[2874,2878,2886,2890,2898,2902,2909],{"nodeType":1281,"value":2875,"marks":2876,"data":2877},"The same structural pattern has continued into 2026 with the Anodot supply chain compromise, which has produced confirmed breaches at",[],{},{"nodeType":1375,"data":2879,"content":2881},{"uri":2880},"https://www.bleepingcomputer.com/news/security/vimeo-data-breach-exposes-personal-information-of-119-000-people/",[2882],{"nodeType":1281,"value":2883,"marks":2884,"data":2885}," Vimeo",[],{},{"nodeType":1281,"value":2887,"marks":2888,"data":2889}," (119,000 users), Rockstar Games (78.6 million records), and",[],{},{"nodeType":1375,"data":2891,"content":2893},{"uri":2892},"https://www.bleepingcomputer.com/news/security/zara-data-breach-exposed-personal-information-of-197-000-people/",[2894],{"nodeType":1281,"value":2895,"marks":2896,"data":2897}," Zara/Inditex",[],{},{"nodeType":1281,"value":2899,"marks":2900,"data":2901}," (197,000 people), with further downstream victims likely still emerging. The",[],{},{"nodeType":1375,"data":2903,"content":2904},{"uri":1661},[2905],{"nodeType":1281,"value":2906,"marks":2907,"data":2908}," Vercel breach",[],{},{"nodeType":1281,"value":2910,"marks":2911,"data":2912}," demonstrates this too, which involved compromised OAuth tokens from Context.ai cascading into Google Workspace, reinforces the same attack pattern (though it was likely not a ShinyHunters operation despite being claimed by someone pretending to be them).",[],{},{"nodeType":1277,"data":2914,"content":2915},{},[2916],{"nodeType":1281,"value":2917,"marks":2918,"data":2919},"A forgotten SaaS integration can easily become the pivot point for downstream compromise. The moment you authorize a third-party integration, your security boundary extends to include that vendor. If the third-party is compromised, every downstream customer organization with an active integration is exposed.",[],{},{"nodeType":1286,"data":2921,"content":2922},{},[],{"nodeType":1290,"data":2924,"content":2925},{},[2926],{"nodeType":1281,"value":2927,"marks":2928,"data":2930},"These attacks all happen in the browser",[2929],{"type":1297},{},{"nodeType":1277,"data":2932,"content":2933},{},[2934,2938,2946],{"nodeType":1281,"value":2935,"marks":2936,"data":2937},"Every one of these attack chains is a browser-based attack that either occurs in the browser (AiTM phishing, device code phishing) or could have been prevented at the browser layer (OAuth consent governance). The techniques are interchangeable — the",[],{},{"nodeType":1375,"data":2939,"content":2941},{"uri":2940},"https://pushsecurity.com/blog/device-code-phishing/",[2942],{"nodeType":1281,"value":2943,"marks":2944,"data":2945}," same criminal kits now offer AiTM and device code phishing side by side",[],{},{"nodeType":1281,"value":2947,"marks":2948,"data":2949},", and the same threat actor (ShinyHunters) has used all three vectors across different campaigns within the same twelve-month period.",[],{},{"nodeType":1339,"data":2951,"content":2952},{},[2953],{"nodeType":1281,"value":2954,"marks":2955,"data":2957},"How Push can help",[2956],{"type":1297},{},{"nodeType":1277,"data":2959,"content":2960},{},[2961],{"nodeType":1281,"value":2962,"marks":2963,"data":2964},"Push operates at the exact point in each of these attack chains where automated intervention can still prevent the compromise. ",[],{},{"nodeType":1277,"data":2966,"content":2967},{},[2968,2973,2977,2984],{"nodeType":1281,"value":2969,"marks":2970,"data":2972},"For vishing + AiTM attacks, ",[2971],{"type":1297},{},{"nodeType":1281,"value":2974,"marks":2975,"data":2976},"Push's",[],{},{"nodeType":1375,"data":2978,"content":2979},{"uri":2722},[2980],{"nodeType":1281,"value":2981,"marks":2982,"data":2983}," behavioral phishing detection",[],{},{"nodeType":1281,"value":2985,"marks":2986,"data":2987}," analyzes and blocks the phishing page in real time by detecting it from the user's browser — regardless of the domains used, hosting infrastructure, or where the URL was delivered.  ",[],{},{"nodeType":1277,"data":2989,"content":2990},{},[2991,2996,3000,3007],{"nodeType":1281,"value":2992,"marks":2993,"data":2995},"For device code phishing,",[2994],{"type":1297},{},{"nodeType":1281,"value":2997,"marks":2998,"data":2999}," Push detects the phishing pages associated with ",[],{},{"nodeType":1375,"data":3001,"content":3002},{"uri":2940},[3003],{"nodeType":1281,"value":3004,"marks":3005,"data":3006},"device code phishing kits",[],{},{"nodeType":1281,"value":3008,"marks":3009,"data":3010}," — including generic, technique-class detections that catch new kits without requiring kit-specific signatures. Second, Push provides an additional layer of protection on the legitimate device code authentication pages themselves, preventing users from entering attacker-supplied codes into them. Together, these detections cover both the kit-operated phishing infrastructure and the legitimate auth pages that the attack flow depends on.",[],{},{"nodeType":1277,"data":3012,"content":3013},{},[3014,3019,3023,3031],{"nodeType":1281,"value":3015,"marks":3016,"data":3018},"For OAuth supply chain attacks,",[3017],{"type":1297},{},{"nodeType":1281,"value":3020,"marks":3021,"data":3022}," Push's ",[],{},{"nodeType":1375,"data":3024,"content":3026},{"uri":3025},"https://site.dev.pushsecurity.com/contentful-preview/?blogSlug=analyzing-the-instructure-breach",[3027],{"nodeType":1281,"value":3028,"marks":3029,"data":3030},"detects and controls OAuth consent flows",[],{},{"nodeType":1281,"value":3032,"marks":3033,"data":3034}," at the browser layer — capturing which application is requesting access, what scopes it's requesting, and whether the grant should be permitted under organizational policy. Push customers can also block OAuth connection requests as they transit the browser, enabling security teams to stop unwanted integrations being added in the first place. ",[],{},{"nodeType":1339,"data":3036,"content":3037},{},[3038],{"nodeType":1281,"value":3039,"marks":3040,"data":3042},"Closing thoughts",[3041],{"type":1297},{},{"nodeType":1277,"data":3044,"content":3045},{},[3046],{"nodeType":1281,"value":3047,"marks":3048,"data":3049},"The campaigns documented in this post are not historical — they are ongoing, with new victims surfacing weekly and the underlying criminal infrastructure still actively developing. But the defensive strategy does not require anticipating which specific group, vector, or target sector comes next, because all three converge on the same control point: the browser, where the attack begins or the integration decision is made. Organizations with browser-layer detection and OAuth governance in place have defense-in-depth against the full range of techniques these groups employ, regardless of which specific vector any given campaign uses.",[],{},{"nodeType":1286,"data":3051,"content":3052},{},[],{"nodeType":1277,"data":3054,"content":3055},{},[3056],{"nodeType":1281,"value":3057,"marks":3058,"data":3059},"Push Security is the most powerful AI-native security tool in the browser. Think EDR, but for the browser — high-fidelity telemetry and real-time control across every session, on every device, with no browser migration required. ",[],{},{"nodeType":1277,"data":3061,"content":3062},{},[3063],{"nodeType":1281,"value":1794,"marks":3064,"data":3065},[],{},{"nodeType":1277,"data":3067,"content":3068},{},[3069,3072,3079],{"nodeType":1281,"value":29,"marks":3070,"data":3071},[],{},{"nodeType":1375,"data":3073,"content":3075},{"uri":3074},"https://pushsecurity.com/demo/",[3076],{"nodeType":1281,"value":1808,"marks":3077,"data":3078},[],{},{"nodeType":1281,"value":29,"marks":3080,"data":3081},[],{},{"nodeType":1286,"data":3083,"content":3084},{},[],{"nodeType":1290,"data":3086,"content":3087},{},[3088],{"nodeType":1281,"value":3089,"marks":3090,"data":3092},"Appendix: named ShinyHunters victims since May 2025",[3091],{"type":1297},{},{"nodeType":1277,"data":3094,"content":3095},{},[3096,3100,3107],{"nodeType":1281,"value":3097,"marks":3098,"data":3099},"To give an indication of the scale, the following table documents all publicly named victims attributed to ShinyHunters specifically since the Salesforce campaign began in May 2025. It is not exhaustive: ShinyHunters has claimed over 1,000 organizations in aggregate across its Salesforce campaigns alone, and many victims have not been publicly named. This list also doesn’t include the billion-plus records compromised in the 2024 Snowflake breaches. The major ransomware attacks executed against M&S, Co-op, and Jaguar Land Rover claimed by the ",[],{},{"nodeType":1375,"data":3101,"content":3102},{"uri":2515},[3103],{"nodeType":1281,"value":3104,"marks":3105,"data":3106},"Scattered Lapsus$ Hunters \"brand\"",[],{},{"nodeType":1281,"value":3108,"marks":3109,"data":3110}," also aren't listed below. ",[],{},{"nodeType":3112,"data":3113,"content":3114},"table",{},[3115,3164,3221,3269,3317],{"nodeType":3116,"data":3117,"content":3118},"table-row",{},[3119,3131,3142,3153],{"nodeType":3120,"data":3121,"content":3122},"table-cell",{},[3123],{"nodeType":1277,"data":3124,"content":3125},{},[3126],{"nodeType":1281,"value":3127,"marks":3128,"data":3130},"Campaign",[3129],{"type":1297},{},{"nodeType":3120,"data":3132,"content":3133},{},[3134],{"nodeType":1277,"data":3135,"content":3136},{},[3137],{"nodeType":1281,"value":3138,"marks":3139,"data":3141},"Began",[3140],{"type":1297},{},{"nodeType":3120,"data":3143,"content":3144},{},[3145],{"nodeType":1277,"data":3146,"content":3147},{},[3148],{"nodeType":1281,"value":3149,"marks":3150,"data":3152},"Named victims",[3151],{"type":1297},{},{"nodeType":3120,"data":3154,"content":3155},{},[3156],{"nodeType":1277,"data":3157,"content":3158},{},[3159],{"nodeType":1281,"value":3160,"marks":3161,"data":3163},"Confirmed impact",[3162],{"type":1297},{},{"nodeType":3116,"data":3165,"content":3166},{},[3167,3191,3201,3211],{"nodeType":3120,"data":3168,"content":3169},{},[3170],{"nodeType":1277,"data":3171,"content":3172},{},[3173,3178,3182,3187],{"nodeType":1281,"value":3174,"marks":3175,"data":3177},"ShinyHunters Salesforce Vishing",[3176],{"type":1297},{},{"nodeType":1281,"value":3179,"marks":3180,"data":3181}," (vishing + device code phishing → Salesforce connected app authorization) \n\n& ",[],{},{"nodeType":1281,"value":3183,"marks":3184,"data":3186},"Salesloft/Drift Supply Chain",[3185],{"type":1297},{},{"nodeType":1281,"value":3188,"marks":3189,"data":3190}," (stolen OAuth tokens → downstream Salesforce access)",[],{},{"nodeType":3120,"data":3192,"content":3193},{},[3194],{"nodeType":1277,"data":3195,"content":3196},{},[3197],{"nodeType":1281,"value":3198,"marks":3199,"data":3200},"May 2025",[],{},{"nodeType":3120,"data":3202,"content":3203},{},[3204],{"nodeType":1277,"data":3205,"content":3206},{},[3207],{"nodeType":1281,"value":3208,"marks":3209,"data":3210},"Coca-Cola Europacific Partners, Cisco, Qantas, LVMH, Adidas, Google, Chanel, Pandora, Allianz Life, Air France-KLM, Farmers Insurance, Workday, TransUnion, Stellantis, Kering, Odido, Hallmark, Salesloft (origin), Toast, Avalara, Fastly, Cato Networks, Cloudflare, Palo Alto Networks, Zscaler, Tenable, Elastic, JFrog, CyberArk, Rubrik, BeyondTrust, Proofpoint, Workiva, Mercer Advisors, Beacon Pointe, Ameriprise, Kemper, Udemy, 7-Eleven, Mytheresa, Marcus & Millichap, Carnival, Pitney Bowes, Alert 360, Amtrak, McGraw-Hill, Canada Life",[],{},{"nodeType":3120,"data":3212,"content":3213},{},[3214],{"nodeType":1277,"data":3215,"content":3216},{},[3217],{"nodeType":1281,"value":3218,"marks":3219,"data":3220},"48 named victims. Confirmed individual impact includes 23M+ records (Coca-Cola), 5.7M records (Qantas), 6.2M customers (Odido), 4.4M consumers (TransUnion), up to 18M records (Stellantis), 13.5M emails (McGraw-Hill), 8.2M emails (Pitney Bowes), 7.5M emails (Carnival). ShinyHunters claims 1.5B+ Salesforce records across 1,000+ organizations total.",[],{},{"nodeType":3116,"data":3222,"content":3223},{},[3224,3239,3249,3259],{"nodeType":3120,"data":3225,"content":3226},{},[3227],{"nodeType":1277,"data":3228,"content":3229},{},[3230,3235],{"nodeType":1281,"value":3231,"marks":3232,"data":3234},"Vishing + AiTM SSO",[3233],{"type":1297},{},{"nodeType":1281,"value":3236,"marks":3237,"data":3238}," (vishing → AiTM phishing page → SSO session capture → SaaS data exfiltration)",[],{},{"nodeType":3120,"data":3240,"content":3241},{},[3242],{"nodeType":1277,"data":3243,"content":3244},{},[3245],{"nodeType":1281,"value":3246,"marks":3247,"data":3248},"Aug 2025",[],{},{"nodeType":3120,"data":3250,"content":3251},{},[3252],{"nodeType":1277,"data":3253,"content":3254},{},[3255],{"nodeType":1281,"value":3256,"marks":3257,"data":3258},"SoundCloud, GrubHub, Panera Bread, Match Group, Crunchbase, Betterment, CarMax, Edmunds, CarGurus, Hims & Hers, University of Pennsylvania, Harvard University, Optimizely, TELUS Digital, Crunchyroll, ADT",[],{},{"nodeType":3120,"data":3260,"content":3261},{},[3262],{"nodeType":1277,"data":3263,"content":3264},{},[3265],{"nodeType":1281,"value":3266,"marks":3267,"data":3268},"16 named victims. Confirmed individual impact includes ~30M records (SoundCloud), ~14M records (Panera), 10M+ records (Match Group), ~20M records (Betterment), 5.5M people (ADT), 1M+ records (UPenn), ~1PB stolen from TELUS Digital ($65M ransom refused).",[],{},{"nodeType":3116,"data":3270,"content":3271},{},[3272,3287,3297,3307],{"nodeType":3120,"data":3273,"content":3274},{},[3275],{"nodeType":1277,"data":3276,"content":3277},{},[3278,3283],{"nodeType":1281,"value":3279,"marks":3280,"data":3282},"Anodot Supply Chain",[3281],{"type":1297},{},{"nodeType":1281,"value":3284,"marks":3285,"data":3286}," (stolen OAuth tokens → downstream Snowflake/BigQuery access)",[],{},{"nodeType":3120,"data":3288,"content":3289},{},[3290],{"nodeType":1277,"data":3291,"content":3292},{},[3293],{"nodeType":1281,"value":3294,"marks":3295,"data":3296},"Apr 2026",[],{},{"nodeType":3120,"data":3298,"content":3299},{},[3300],{"nodeType":1277,"data":3301,"content":3302},{},[3303],{"nodeType":1281,"value":3304,"marks":3305,"data":3306},"Anodot/Glassbox (origin), Rockstar Games, Vimeo, Zara/Inditex",[],{},{"nodeType":3120,"data":3308,"content":3309},{},[3310],{"nodeType":1277,"data":3311,"content":3312},{},[3313],{"nodeType":1281,"value":3314,"marks":3315,"data":3316},"4 named victims (12+ total claimed). 78.6M records (Rockstar Games), 197K individuals (Zara), 119K individuals (Vimeo).",[],{},{"nodeType":3116,"data":3318,"content":3319},{},[3320,3335,3344,3354],{"nodeType":3120,"data":3321,"content":3322},{},[3323],{"nodeType":1277,"data":3324,"content":3325},{},[3326,3331],{"nodeType":1281,"value":3327,"marks":3328,"data":3330},"Other SLH-attributed",[3329],{"type":1297},{},{"nodeType":1281,"value":3332,"marks":3333,"data":3334}," (misc. vectors including infostealer chains, CI/CD supply chain, SaaS platform compromise)",[],{},{"nodeType":3120,"data":3336,"content":3337},{},[3338],{"nodeType":1277,"data":3339,"content":3340},{},[3341],{"nodeType":1281,"value":3198,"marks":3342,"data":3343},[],{},{"nodeType":3120,"data":3345,"content":3346},{},[3347],{"nodeType":1277,"data":3348,"content":3349},{},[3350],{"nodeType":1281,"value":3351,"marks":3352,"data":3353},"UK Legal Aid Agency, Mixpanel, Wynn Resorts, Woflow, Vercel, European Commission, Mercor, Medtronic, Instructure",[],{},{"nodeType":3120,"data":3355,"content":3356},{},[3357],{"nodeType":1277,"data":3358,"content":3359},{},[3360],{"nodeType":1281,"value":3361,"marks":3362,"data":3363},"10 named victims across varied vectors. Notable: Vercel (Lumma Stealer → Context.ai OAuth app → Google Workspace), European Commission (poisoned Trivy GitHub Action → 340GB across 71 EU entities)",[],{},{"nodeType":1277,"data":3365,"content":3366},{},[3367],{"nodeType":1281,"value":29,"marks":3368,"data":3369},[],{},"The three attack techniques behind ShinyHunters' 2026 campaigns ","ShinyHunters' breach of Instructure is the latest in a long series of attacks. Here's our view of the big picture. ","2026-05-08T00:00:00.000Z","analyzing-the-instructure-breach",{"items":3375},[3376,3380],{"sys":3377,"name":3379},{"id":3378},"6A5RXS31ZQx3PwryGb1IMy","Browser-based attacks",{"sys":3381,"name":3383},{"id":3382},"4ksQNCFeBf8H4QIORqpRLw","Detection & response",{"items":3385},[3386],{"fullName":2494,"firstName":2495,"jobTitle":2496,"profilePicture":3387},{"url":2498},{"__typename":1894,"sys":3389,"content":3391,"title":3903,"synopsis":3904,"hashTags":62,"publishedDate":3905,"slug":3906,"tagsCollection":3907,"authorsCollection":3913},{"id":3390},"2MWicW07sNEBp59wxYtAiC",{"json":3392},{"nodeType":1273,"data":3393,"content":3394},{},[3395,3403,3434,3440,3447,3466,3481,3484,3492,3507,3527,3552,3558,3574,3605,3611,3617,3633,3636,3644,3651,3659,3677,3693,3701,3727,3734,3742,3773,3780,3788,3795,3801,3804,3812,3819,3827,3833,3836,3844,3851,3858,3865,3877,3880,3886],{"nodeType":1290,"data":3396,"content":3397},{},[3398],{"nodeType":1281,"value":3399,"marks":3400,"data":3402},"The quantification problem nobody talks about",[3401],{"type":1297},{},{"nodeType":1277,"data":3404,"content":3405},{},[3406,3410,3418,3422,3430],{"nodeType":1281,"value":3407,"marks":3408,"data":3409},"I was recently teaching",[],{},{"nodeType":1375,"data":3411,"content":3413},{"uri":3412},"https://www.sans.org/cyber-security-courses/cybersecurity-leaders/",[3414],{"nodeType":1281,"value":3415,"marks":3416,"data":3417}," SANS LDR551",[],{},{"nodeType":1281,"value":3419,"marks":3420,"data":3421},", where we cover some of the flawed approaches used in risk measurement and prioritization — for example, presenting ordinal data in a risk matrix as ratio data, implying that the matrix represents quantitative analysis when it’s more of a best guess. We then look at modeling using",[],{},{"nodeType":1375,"data":3423,"content":3425},{"uri":3424},"https://en.wikipedia.org/wiki/Loss_exceedance_curve",[3426],{"nodeType":1281,"value":3427,"marks":3428,"data":3429}," Loss Exceedance Curves",[],{},{"nodeType":1281,"value":3431,"marks":3432,"data":3433}," as a more accurate, if much more difficult, approach to quantitative risk assessment.",[],{},{"nodeType":1330,"data":3435,"content":3439},{"target":3436},{"sys":3437},{"id":3438,"type":1335,"linkType":1336},"4S1wJUm6E1qvyZzwrl2DL",[],{"nodeType":1277,"data":3441,"content":3442},{},[3443],{"nodeType":1281,"value":3444,"marks":3445,"data":3446},"The only problem is, we rarely have the time or the data to construct such models. Ask a CISO how they measure risk for credential compromise and other account takeover attacks, and the answer will probably include one or more of the following: a risk assessment, a whiteboard, and a room full of smart people making educated guesses about attack frequency and control strength. ",[],{},{"nodeType":1277,"data":3448,"content":3449},{},[3450,3454,3462],{"nodeType":1281,"value":3451,"marks":3452,"data":3453},"That isn't a criticism — for most risk scenarios, expert elicitation is the best (and most convenient) available method. Breach cost data is sparse, threat actor behavior is unpredictable, and internal incident history is (ideally!) a limited sample. Quantitative risk frameworks like",[],{},{"nodeType":1375,"data":3455,"content":3457},{"uri":3456},"https://www.fairinstitute.org/",[3458],{"nodeType":1281,"value":3459,"marks":3460,"data":3461}," FAIR",[],{},{"nodeType":1281,"value":3463,"marks":3464,"data":3465}," give structure to that uncertainty, but they can't conjure data that just doesn't exist.",[],{},{"nodeType":1277,"data":3467,"content":3468},{},[3469,3473,3478],{"nodeType":1281,"value":3470,"marks":3471,"data":3472},"The results are usually estimates with wide confidence intervals and loss distributions that appear precise, but are hard to defend to a CFO or a board. Finance leaders have seen Monte Carlo simulations before; the capable ones will challenge the quality of the outputs if they doubt the quality of the inputs. ",[],{},{"nodeType":1281,"value":3474,"marks":3475,"data":3477},"But with the right telemetry, we can get both",[3476],{"type":1297},{},{"nodeType":1281,"value":1383,"marks":3479,"data":3480},[],{},{"nodeType":1286,"data":3482,"content":3483},{},[],{"nodeType":1290,"data":3485,"content":3486},{},[3487],{"nodeType":1281,"value":3488,"marks":3489,"data":3491},"Why the identity attack surface is uniquely measurable",[3490],{"type":1297},{},{"nodeType":1277,"data":3493,"content":3494},{},[3495,3499,3504],{"nodeType":1281,"value":3496,"marks":3497,"data":3498},"We've written extensively about the shift to identity as a primary attack vector — and the evidence continues to stack up. Credential phishing, device code phishing, ClickFix, adversary-in-the-middle attacks, session hijacking, and SaaS account compromise now account for the majority of breach entry points in most enterprise environments. But the silver lining here is that this shift has created something valuable for risk quantification: ",[],{},{"nodeType":1281,"value":3500,"marks":3501,"data":3503},"a highly observable threat surface",[3502],{"type":276},{},{"nodeType":1281,"value":1383,"marks":3505,"data":3506},[],{},{"nodeType":1277,"data":3508,"content":3509},{},[3510,3514,3523],{"nodeType":1281,"value":3511,"marks":3512,"data":3513},"Identity attacks execute ",[],{},{"nodeType":1375,"data":3515,"content":3517},{"uri":3516},"https://pushsecurity.com/blog/introducing-the-browser-and-identity-attacks-matrix/",[3518],{"nodeType":1281,"value":3519,"marks":3520,"data":3522},"in the browser",[3521],{"type":1811},{},{"nodeType":1281,"value":3524,"marks":3525,"data":3526},". They leave traces in authentication flows, login behaviors, OAuth integrations, extension activity, and SaaS access patterns — all of which are captured in real time by the Push extension. Unlike network or endpoint attacks, where the signal is often binary and retroactive, browser-based identity threats generate continuous, high-frequency telemetry that maps directly onto the inputs that drive quantitative risk models.",[],{},{"nodeType":1277,"data":3528,"content":3529},{},[3530,3534,3539,3543,3548],{"nodeType":1281,"value":3531,"marks":3532,"data":3533},"This telemetry directly informs the hardest inputs in any quantitative risk model. One is ",[],{},{"nodeType":1281,"value":3535,"marks":3536,"data":3538},"Threat Event Frequency (TEF)",[3537],{"type":1297},{},{"nodeType":1281,"value":3540,"marks":3541,"data":3542},": how often a threat agent acts against an asset in a given period. For identity risks, this can be answered in how many credential phishing attempts reached your users across all delivery channels (social media, email, malvertising, etc.), or how frequently your users authorize malicious or compromised SaaS apps. Browser-level telemetry can answer these questions with ",[],{},{"nodeType":1281,"value":3544,"marks":3545,"data":3547},"observed",[3546],{"type":276},{},{"nodeType":1281,"value":3549,"marks":3550,"data":3551}," data rather than industry lookups and general benchmarks. ",[],{},{"nodeType":1330,"data":3553,"content":3557},{"target":3554},{"sys":3555},{"id":3556,"type":1335,"linkType":1336},"EvjT68MCWW7nz5q86xe8S",[],{"nodeType":1277,"data":3559,"content":3560},{},[3561,3565,3570],{"nodeType":1281,"value":3562,"marks":3563,"data":3564},"The other input to risk modeling that's difficult to express in concrete terms is ",[],{},{"nodeType":1281,"value":3566,"marks":3567,"data":3569},"vulnerability",[3568],{"type":1297},{},{"nodeType":1281,"value":3571,"marks":3572,"data":3573},": the probability a threat becomes a loss event or, more specifically, how likely it is that your controls will fail. ",[],{},{"nodeType":1277,"data":3575,"content":3576},{},[3577,3581,3589,3593,3601],{"nodeType":1281,"value":3578,"marks":3579,"data":3580},"This is where browser telemetry gets especially concrete.",[],{},{"nodeType":1375,"data":3582,"content":3584},{"uri":3583},"https://pushsecurity.com/blog/how-many-vulnerable-identities-do-you-have/",[3585],{"nodeType":1281,"value":3586,"marks":3587,"data":3588}," Analysis of login telemetry across Push-monitored environments",[],{},{"nodeType":1281,"value":3590,"marks":3591,"data":3592}," shows that 1 in 4 logins are still password-only (not SSO), 2 in 5 are not protected by MFA, and 1 in 5 use a weak, breached, or reused password. Many of these logins occur outside the visibility of a central IdP platform like Microsoft, Google or Okta — the result of downstream ",[],{},{"nodeType":1375,"data":3594,"content":3596},{"uri":3595},"https://pushsecurity.com/blog/ghost-logins-when-forgotten-identities-come-back-to-haunt-you/",[3597],{"nodeType":1281,"value":3598,"marks":3599,"data":3600},"ghost logins",[],{},{"nodeType":1281,"value":3602,"marks":3603,"data":3604},". ",[],{},{"nodeType":1330,"data":3606,"content":3610},{"target":3607},{"sys":3608},{"id":3609,"type":1335,"linkType":1336},"5GctExdVGjHRwKifiP00Fp",[],{"nodeType":1330,"data":3612,"content":3616},{"target":3613},{"sys":3614},{"id":3615,"type":1335,"linkType":1336},"2mWToHCJcuB9FMwxxzd67F",[],{"nodeType":1277,"data":3618,"content":3619},{},[3620,3624,3629],{"nodeType":1281,"value":3621,"marks":3622,"data":3623},"In a FAIR-based model, TEF and vulnerability together determine ",[],{},{"nodeType":1281,"value":3625,"marks":3626,"data":3628},"loss event frequency",[3627],{"type":1297},{},{"nodeType":1281,"value":3630,"marks":3631,"data":3632},": the foundational driver of the entire risk calculation. Using telemetry from your own environment as the basis for these calculations makes them far more accurate, and more likely to stand up to scrutiny.",[],{},{"nodeType":1286,"data":3634,"content":3635},{},[],{"nodeType":1290,"data":3637,"content":3638},{},[3639],{"nodeType":1281,"value":3640,"marks":3641,"data":3643},"The attack surface is bigger than most models assume",[3642],{"type":1297},{},{"nodeType":1277,"data":3645,"content":3646},{},[3647],{"nodeType":1281,"value":3648,"marks":3649,"data":3650},"One of the consistent failures in identity risk modeling is the tendency to model risks defenders can see, and leave the rest off the balance sheet. These omissions create a systematic understatement of exposure that browser-based telemetry can offset.",[],{},{"nodeType":1339,"data":3652,"content":3653},{},[3654],{"nodeType":1281,"value":3655,"marks":3656,"data":3658},"Shadow AI and OAuth sprawl",[3657],{"type":1297},{},{"nodeType":1277,"data":3660,"content":3661},{},[3662,3665,3673],{"nodeType":1281,"value":29,"marks":3663,"data":3664},[],{},{"nodeType":1375,"data":3666,"content":3667},{"uri":1661},[3668],{"nodeType":1281,"value":3669,"marks":3670,"data":3672},"The Vercel breach in April 2026",[3671],{"type":1811},{},{"nodeType":1281,"value":3674,"marks":3675,"data":3676}," was the result of an OAuth connection to a third-party AI SaaS tool a developer connected into the organization's Google Workspace tenant (without admin approval). When the AI vendor was compromised, the attacker leveraged stored OAuth tokens to access downstream accounts, ultimately reaching internal dashboards, API keys, and source code. ",[],{},{"nodeType":1277,"data":3678,"content":3679},{},[3680,3684,3689],{"nodeType":1281,"value":3681,"marks":3682,"data":3683},"Push telemetry across customer environments shows an average of ",[],{},{"nodeType":1281,"value":3685,"marks":3686,"data":3688},"17 unique AI app integrations per organization in Microsoft and Google alone",[3687],{"type":1297},{},{"nodeType":1281,"value":3690,"marks":3691,"data":3692},", most of which security teams would describe as unapproved. These generally don't appear in a conventional risk model that isn't looking for them.",[],{},{"nodeType":1339,"data":3694,"content":3695},{},[3696],{"nodeType":1281,"value":3697,"marks":3698,"data":3700},"Browser extensions",[3699],{"type":1297},{},{"nodeType":1277,"data":3702,"content":3703},{},[3704,3708,3718,3723],{"nodeType":1281,"value":29,"marks":3705,"data":3707},[3706],{"type":1297},{},{"nodeType":1375,"data":3709,"content":3711},{"uri":3710},"https://pushsecurity.com/blog/why-browser-extension-risk-scoring-wont-predict-your-next-breach/",[3712],{"nodeType":1281,"value":3713,"marks":3714,"data":3717},"Analysis of 20,000 unique extensions deployed across Push customer environments",[3715,3716],{"type":1811},{"type":1297},{},{"nodeType":1281,"value":3719,"marks":3720,"data":3722}," found that 46.76% have the permission combinations required for account takeover without user interaction. ",[3721],{"type":1297},{},{"nodeType":1281,"value":3724,"marks":3725,"data":3726},"The extensions carrying these permissions aren't flagged by risk scoring systems because the same permissions are used by ad blockers, password managers, and translation tools (the downside of relying on tools that rely on dubious scoring to assess extensions, but I digress). ",[],{},{"nodeType":1277,"data":3728,"content":3729},{},[3730],{"nodeType":1281,"value":3731,"marks":3732,"data":3733},"What matters for risk quantification isn't the permission set or an arbitrary score assigned by a vendor; it's whether the monitoring exists to detect when a previously-clean extension changes ownership, escalates permissions, or behaves anomalously. Without that monitoring, the exposure is real but unquantified.",[],{},{"nodeType":1339,"data":3735,"content":3736},{},[3737],{"nodeType":1281,"value":3738,"marks":3739,"data":3741},"ClickFix and non-email delivery channels",[3740],{"type":1297},{},{"nodeType":1277,"data":3743,"content":3744},{},[3745,3749,3757,3761,3769],{"nodeType":1281,"value":3746,"marks":3747,"data":3748},"ClickFix — where a malicious page silently writes a PowerShell or mshta command into the victim's clipboard and instructs them to paste it — was",[],{},{"nodeType":1375,"data":3750,"content":3752},{"uri":3751},"https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/msc/documents/presentations/CSR/Microsoft-Digital-Defense-Report-2025.pdf",[3753],{"nodeType":1281,"value":3754,"marks":3755,"data":3756}," the most common initial access vector observed by Microsoft in 2025",[],{},{"nodeType":1281,"value":3758,"marks":3759,"data":3760},", and CrowdStrike reported a",[],{},{"nodeType":1375,"data":3762,"content":3764},{"uri":3763},"https://www.crowdstrike.com/explore/2026-global-threat-report",[3765],{"nodeType":1281,"value":3766,"marks":3767,"data":3768}," 563% increase in fake CAPTCHA lures",[],{},{"nodeType":1281,"value":3770,"marks":3771,"data":3772}," (one of the most common ClickFix styles in which the user has to \"verify they're human\" by running a command on their machine). ",[],{},{"nodeType":1277,"data":3774,"content":3775},{},[3776],{"nodeType":1281,"value":3777,"marks":3778,"data":3779},"What makes this particularly relevant for risk quantification is the delivery channel: 4 in 5 ClickFix payloads intercepted by Push arrive via search engines, not email. A risk model that estimates threat event frequency from email-based phishing telemetry alone is structurally blind to an entire category of attack that has become one of the most prevalent initial access methods in the landscape.",[],{},{"nodeType":1339,"data":3781,"content":3782},{},[3783],{"nodeType":1281,"value":3784,"marks":3785,"data":3787},"Authorization attacks",[3786],{"type":1297},{},{"nodeType":1277,"data":3789,"content":3790},{},[3791],{"nodeType":1281,"value":3792,"marks":3793,"data":3794},"Device code phishing and OAuth consent abuse represent a slightly separate category of identity attack that most risk models don't account for because they operate after the authentication flow has already completed — meaning password strength, MFA coverage, and SSO adoption are irrelevant to whether the attack succeeds. ",[],{},{"nodeType":1330,"data":3796,"content":3800},{"target":3797},{"sys":3798},{"id":3799,"type":1335,"linkType":1336},"7qtHmxCzBm5664jD6HsCwN",[],{"nodeType":1286,"data":3802,"content":3803},{},[],{"nodeType":1290,"data":3805,"content":3806},{},[3807],{"nodeType":1281,"value":3808,"marks":3809,"data":3811},"The key lesson for CISOs",[3810],{"type":1297},{},{"nodeType":1277,"data":3813,"content":3814},{},[3815],{"nodeType":1281,"value":3816,"marks":3817,"data":3818},"A risk model that measures identity vulnerability purely in terms of authentication hygiene at the IdP layer — how many accounts have MFA, how many use SSO — will correctly quantify one dimension of exposure while completely missing another that is growing faster and is structurally immune to the controls being measured.",[],{},{"nodeType":1277,"data":3820,"content":3821},{},[3822],{"nodeType":1281,"value":3823,"marks":3824,"data":3826},"For a CISO building a risk model, these aren't edge cases. They represent a real attack surface that doesn't show up in models built on conventional network, endpoint, and cloud telemetry. We aren't just talking about better inputs to risk modeling — we're talking about entirely new risk scenarios that aren't being modeled at all, supported by live data.",[3825],{"type":1297},{},{"nodeType":1330,"data":3828,"content":3832},{"target":3829},{"sys":3830},{"id":3831,"type":1335,"linkType":1336},"2ObEcO1gqz8lrOLCZzfpNw",[],{"nodeType":1286,"data":3834,"content":3835},{},[],{"nodeType":1339,"data":3837,"content":3838},{},[3839],{"nodeType":1281,"value":3840,"marks":3841,"data":3843},"Browser telemetry makes a CISO's life easier",[3842],{"type":1297},{},{"nodeType":1277,"data":3845,"content":3846},{},[3847],{"nodeType":1281,"value":3848,"marks":3849,"data":3850},"Browser-based telemetry changes the conversation a CISO can have with a CFO or board. Instead of \"industry benchmarks suggest our expected annual loss from account compromise is somewhere in this range,\" the answer is, \"We can see how often these attacks are attempted against our users, and we can measure what percentage of our accounts have the controls in place to stop them,\" or \"We know how many shadow AI apps our users self-provision and share data with each month.\" ",[],{},{"nodeType":1277,"data":3852,"content":3853},{},[3854],{"nodeType":1281,"value":3855,"marks":3856,"data":3857},"Identity risk is only a piece of the quantification problem. Loss magnitude, regulatory exposure, and reputational impact are still extremely hard to estimate regardless of how good your frequency inputs are. ",[],{},{"nodeType":1277,"data":3859,"content":3860},{},[3861],{"nodeType":1281,"value":3862,"marks":3863,"data":3864},"But the identity attack surface is one of the few areas in security where measurement is genuinely achievable right now, and the gap between what most organizations are modeling and what's actually observable is significant. Shadow SaaS integrations, unapproved AI connections, browser extensions with excessive privileges — these are enumerable risks that don't appear in models built on network, endpoint, and cloud access telemetry alone. ",[],{},{"nodeType":1277,"data":3866,"content":3867},{},[3868,3873],{"nodeType":1281,"value":3869,"marks":3870,"data":3872},"The lesson for CISOs serious about quantitative risk management is this: the frameworks exist, the talent is available, and the bottleneck is almost always data quality. ",[3871],{"type":1297},{},{"nodeType":1281,"value":3874,"marks":3875,"data":3876},"Browser telemetry is a good example of the kind of high-fidelity, environment-specific measurement that closes that gap.",[],{},{"nodeType":1286,"data":3878,"content":3879},{},[],{"nodeType":1277,"data":3881,"content":3882},{},[3883],{"nodeType":1281,"value":3057,"marks":3884,"data":3885},[],{},{"nodeType":1277,"data":3887,"content":3888},{},[3889,3892,3900],{"nodeType":1281,"value":1794,"marks":3890,"data":3891},[],{},{"nodeType":1375,"data":3893,"content":3895},{"uri":3894},"https://pushsecurity.com/book-demo/",[3896],{"nodeType":1281,"value":3897,"marks":3898,"data":3899}," Book a live demo",[],{},{"nodeType":1281,"value":2476,"marks":3901,"data":3902},[],{},"The CISO's data problem (and how browser telemetry can help)","How CISOs can use browser telemetry to support cyber risk quantification in areas where traditional data points fall short. ","2026-05-11T00:00:00.000Z","the-cisos-data-problem-and-how-browser-telemetry-can-help",{"items":3908},[3909,3911],{"sys":3910,"name":2490},{"id":2489},{"sys":3912,"name":3383},{"id":3382},{"items":3914},[3915],{"fullName":1266,"firstName":1267,"jobTitle":1268,"profilePicture":3916},{"url":1270},"verizon-dbir-2026-review","blog/verizon-dbir-2026-review",{"json":3920},{"data":3921,"content":3922,"nodeType":1273},{},[3923],{"data":3924,"content":3925,"nodeType":1277},{},[3926,3930,3938],{"data":3927,"marks":3928,"value":3929,"nodeType":1281},{},[],"Verizon's ",{"data":3931,"content":3933,"nodeType":1375},{"uri":3932},"verizon.com/business/resources/reports/2026-dbir-data-breach-investigations-report.pdf",[3934],{"data":3935,"marks":3936,"value":3937,"nodeType":1281},{},[],"2026 Data Breach Investigations Report",{"data":3939,"marks":3940,"value":3941,"nodeType":1281},{},[]," landed this week with the largest dataset in the report's 19-year history — more than 22,000 confirmed breaches across 145 countries, nearly double last year's count.","What we can learn from 2026's installment of the Verizon Data Breach Investigations Report.",{"id":3944,"publishedAt":3945},"7sZs2lHCTN8oYc2OIGCIQG","2026-05-20T17:40:56.722Z",{"items":3947},[3948,3950],{"sys":3949,"name":2486},{"id":2485},{"sys":3951,"name":3379},{"id":3378},"27m1HFrmDcOyVgL_atuoaxjDQ_LbxEdaGgiRIoOtxOQ",1779300452706]