Webinar Series - On Demand
State of Browser Attacks Series: Security Theater vs. Security That Works
Why your controls aren't doing what you think they are — and what actually stops attackers.


Got questions for John or Luke?
Agenda: Security Theater vs. Security That Works
Modern enterprises have invested heavily in security: email gateways, endpoint agents, network monitoring, SIEM, SOAR, and more. Yet breaches keep happening. And they're not happening in the sophisticated ways most security teams are preparing for.
Attackers aren't burning zero-days or crafting complex exploit chains. They're simply logging into apps over the internet with stolen or phished credentials, dumping sensitive data, and cashing out. No endpoint malware. No noisy lateral movement. And ultimately, no alerts firing.
The uncomfortable truth is that the security stack was built for a world that no longer exists. The perimeter moved to identity. Work moved to the browser. But detection and response never followed. The result is a growing gap between what organizations think they're protected against and where attacks are actually landing.
It's security theater, and attackers know it.
Push Security Field CTO Mark Orlando is joined by Matt Johansen for an honest look at where enterprise security is falling short and what actually works.
You'll learn:
- Why traditional controls are missing the attacks that matter most
- How attackers are exploiting the gap between identity, SaaS, and the browser
- What controls make the biggest difference today, and what is pure theater
- How security teams can operationalize browser telemetry and adopt engineering-based approaches to level the playing field
Agenda: Why the Browser is the New Battleground
The browser is the new endpoint, and it's under attack. Attacks are happening entirely inside the browser sandbox, targeting applications directly over the internet, and blending in with legitimate web and network traffic, application access, and user activity. This is a significant challenge for security teams. Existing security tools can't get visibility of what's happening inside the browser. Attackers know this, and are ruthlessly exploiting the browser blindspot. This is fuelling a lot of attacker innovation, with new tools and techniques constantly emerging. Push Security VP R&D Luke Jennings is joined by John Hammond, Senior Principal Security Researcher at Huntress, to demonstrate the latest browser-based attack techniques. Ride along with Luke and John as they analyse real-world attacks, covering:
- ConsentFix, the browser-native ClickFix attack linked to Russian APTs
- Session-stealing, MFA-bypassing phishing campaigns targeting enterprises over LinkedIn and Google Ads
- The latest social engineering tradecraft and detection evasion techniques
- What the future of browser-based attacks looks like and what security teams can do about it