Push Security Research
Browser & Identity Attacks Matrix
A collection of attack techniques organized by tactic phase. Inspired by MITRE ATT&CK and adapted for cloud-first environments where attacks require no network access or endpoint compromise.
Reconnaissance
5 techniques
Initial Access
24 techniques
Execution
4 techniques
Persistence
12 techniques
Privilege Escalation
3 techniques
Defense Evasion
11 techniques
Discovery
3 techniques
Lateral Movement
11 techniques