New Ebook // 2024: A Year of Identity Attacks

Get the latest content from Push Security

Luke JenningsVP of Research

Search our content library:

Newest
Oldest
All Types
Ebook
Video
Webinar
Podcast
Webinar
On-demand webinar: Automating identity attacks
Using CUAs like OpenAI Operator to automate identity attacks.
// Learn more
Ebook
2024: A Year of Identity Attacks
Looking back on identity attacks in 2024 and the evolution of attacker tooling and techniques.
// Learn more
Ebook
Push Security named Rising Star for ITDR by KuppingerCole
Read the KuppingerCole 2024 “Rising Star: Push Security” report to find out why Push Security has been named a rising star in the emerging Identity Threat Detection and Response (ITDR) category.
// Learn more
Webinar
On-demand webinar: Phish kit teardown
Luke Jennings, VP R&D at Push Security, tears down popular AitM phishing kits to see what makes them so effective at getting through your defenses.
// Learn more
Webinar
On-demand webinar: Infostealers 2.0
How attackers are stealing your cookies and bypassing MFA.
// Learn more
Podcast
(The RSnake Show) Demo Day — Push Security
Push CEO & co-founder Adam Bateman appeared on the RSnake show to discuss Push's browser-based ITDR product.
// Learn more
Webinar
On-demand webinar: Phishing 2.0
Phishing 2.0 – Detecting Evilginx, EvilnoVNC, Muraena and Modlishka
// Learn more
Webinar
On-demand webinar: Snowflake
Snowflake: The tip of the iceberg – Three practical takeaways from the Snowflake incident.
// Learn more
Video
Demonstrating ghost logins in Snowflake and how to remediate them
Demonstrating ghost logins in Snowflake and how to remediate them.
// Learn more
Video
The New SaaS Cyber Kill Chain: SO-CON 2024
The New SaaS Cyber Kill Chain: SO-CON 2024
// Learn more
Ebook
SaaS Attacks Report: 2024 Edition
How SaaS attacks evolved in 2024 and what we can expect to see more of in 2025.
// Learn more
Podcast
Shared Security - Compromising an Organization without Touching the Network
Shared Security - Compromising an Organization without Touching the Network
// Learn more
Ebook
A Phisher’s Guide to Slack
In this guide on external phishing attacks via Slack, we'll show red teamers and pentesters how to get initial access as the first step in the attack kill chain.
// Learn more
Webinar
Understanding the New SaaS Cyber Kill Chain
What the new SaaS cyber kill chain looks like for modern organizations that are fully SaaS native without any concept of an internal network
// Learn more
Video
BlueHat 2023 - SaaS Cyber Kill Chain
Luke Jennings speaks about the SaaS cyber kill chain at BlueHat 2023
// Learn more
Video
Pain in the SaaS
Pain in the SaaS – How attackers are targeting SaaS services
// Learn more
Video