[{"data":1,"prerenderedAt":1840},["ShallowReactive",2],{"application-flags":3,"navbar":7,"always-visible-banner":36,"navbar-about-highlight":99,"navbar-resource-highlight":173,"use-case-page":219,"fa-icon-regular-faFishingRod":1241,"fa-icon-regular-faPuzzlePiece":1245,"fa-icon-regular-faUserSecret":1247,"fa-icon-regular-faRadar":1249,"fa-icon-regular-faLaptopCode":1251,"fa-icon-regular-faSatelliteDish":1253,"fa-icon-regular-faShieldCheck":1255,"fa-icon-regular-faBrainCircuit":1257,"resources-v-2-/resources/yes-youve-been-pwned":1259,"push-partner":1571},[4],{"name":5,"enabled":6},"maintenanceMode",false,[8],{"createdDate":9,"id":10,"name":11,"modelId":12,"published":13,"query":14,"data":15,"variations":20,"lastUpdated":21,"firstPublished":22,"testRatio":23,"createdBy":24,"lastUpdatedBy":25,"folders":26,"meta":27,"rev":35},1742208588866,"1c7a4e423bf54ac1a328bb4063459ef2","Banner","1c6207a5f24948ab82d4a0b17f251193","published",[],{"type":16,"url":17,"text":18,"link":19},"web-banner","https://pushsecurity.com/resources/browser-attacks-report","Get our latest report analyzing browser attack techniques in 2026",{},{},1774258294825,1742208637545,1,"CydmZnOWU1XuAaLhEDCoYNM4Z8W2","jKjF9r5jcvXU8tzZEfFQm31Iyvr2",[],{"kind":28,"lastPreviewUrl":29,"breakpoints":30,"hasAutosaves":34},"data","",{"xsmall":31,"small":32,"medium":33},320,640,768,true,"hfkfvccns17",{"createdDate":37,"id":38,"name":39,"modelId":40,"published":13,"query":41,"data":42,"variations":88,"lastUpdated":89,"firstPublished":90,"testRatio":23,"createdBy":91,"lastUpdatedBy":92,"folders":93,"meta":94,"rev":98},1774965361051,"fd266d0172cc47429be7ad10f48c99ad","always visible banner","0678d178ec8b41efb8a23c09dba7874d",[],{"ctaText":43,"text":44,"url":29,"blocks":45,"state":84},"ewrererw","testrfesssssssssss",[46,72],{"@type":47,"@version":48,"id":49,"component":50,"responsiveStyles":62},"@builder.io/sdk:Element",2,"builder-ca12c06a52de41d7b8743da53118cd38",{"name":51,"tag":51,"options":52,"isRSC":61},"TopBannerContent",{"text":53,"ctaText":54,"url":55,"mainText":56,"cta":59},"New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks","Save Your Spot","https://pushsecurity.com/webinar/state-of-browser-security",{"content":57,"fontSize":58},"\u003Cp>New Webinar Series: Join John Hammond, Troy Hunt, and Matt Johansen for the State of Browser Attacks\u003C/p>","text-base",{"content":60,"fontSize":58,"url":55},"\u003Cp>\u003Cstrong style=\"font-weight:700;\">Save Your Spot\u003C/strong>\u003C/p>\n",null,{"large":63},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"marginTop":69,"marginBottom":69,"fontSize":70,"fontWeight":71},"flex","column","relative","0","border-box",".56rem","1.125rem","700",{"id":73,"@type":47,"tagName":74,"properties":75,"responsiveStyles":79},"builder-pixel-seibrwlryd","img",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},"https://cdn.builder.io/api/v1/pixel?apiKey=f3a1111ff5be48cdbb123cd9f5795a05","true","presentation",{"large":80},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},"block","hidden","none",{"deviceSize":85,"location":86},"large",{"path":29,"query":87},{},{},1775137295127,1774968080803,"ST0tXQM8slWpFrmioqKHmENB2qe2","ax7YYfD0OCeqT1Vxxv1G4FUbqVr1",[],{"breakpoints":95,"hasLinks":6,"kind":96,"lastPreviewUrl":97,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"component","https://pushsecurity.com/?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=always-visible-banner&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.always-visible-banner=fd266d0172cc47429be7ad10f48c99ad&builder.overrides.fd266d0172cc47429be7ad10f48c99ad=fd266d0172cc47429be7ad10f48c99ad&builder.options.locale=Default","wixe335v74",[100,136],{"createdDate":101,"id":102,"name":103,"modelId":104,"published":13,"stageModifiedSincePublish":6,"query":105,"data":106,"variations":129,"lastUpdated":130,"firstPublished":131,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":132,"meta":133,"rev":135},1776247359804,"9136a8f18b3b4a6ba29b8653a99372b1","testimonial-inductive-automation","20d9eaa352304613b3d1a794b400703d",[],{"link":107,"type":108,"testimonialLink":109,"testimonial":110},{},"testimonial","/customer-stories/inductive-automation",{"@type":111,"id":112,"model":108,"value":113},"@builder.io/core:Reference","f028f2b685bb47cd8bf9e82a26dd5a79",{"query":114,"folders":115,"createdDate":116,"id":112,"name":117,"modelId":118,"published":13,"data":119,"variations":123,"lastUpdated":124,"firstPublished":125,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"meta":126,"rev":128},[],[],1735823466309,"We found Push to be more accurate when compared to competitors and the browser agent offered features that others couldn’t match.","42035571a56940ac98bff4544aa79aa5",{"author":120,"jobTitle":121,"quote":117,"image":122},"Jason Waits","\u003Cp>CISO at Inductive Automation\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff04c0c0689ce4a89ac0f0708d78c0a07",{},1735910703862,1735823501152,{"kind":28,"lastPreviewUrl":29,"breakpoints":127,"hasAutosaves":34},{"small":32,"medium":33},"3kp7jwnjoeo",{},1776247404986,1776247404973,[],{"breakpoints":134,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"ybz37hxaf4e",{"createdDate":137,"id":138,"name":139,"modelId":104,"published":13,"meta":140,"stageModifiedSincePublish":6,"query":142,"data":143,"variations":169,"lastUpdated":170,"firstPublished":171,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":172,"rev":135},1776255761419,"05a9322735fc427db12e2740e4302300","Report: 2026 Browser Attack Techniques",{"breakpoints":141,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[],{"testimonial":144,"link":163,"type":166,"title":139,"description":167,"image":168},{"@type":111,"id":145,"model":108,"value":146},"192acbb1f9ca4cac918c0ec435a8bae3",{"query":147,"folders":148,"createdDate":149,"id":145,"name":150,"modelId":118,"published":13,"data":151,"variations":157,"lastUpdated":158,"firstPublished":159,"testRatio":23,"createdBy":91,"lastUpdatedBy":24,"meta":160,"rev":162},[],[],1728981467463,"Push does for identity what CrowdStrike did for the endpoint",{"video":152,"jobTitle":153,"author":154,"qoute":29,"quote":155,"image":156},"https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8b30e8ca50064058bbaef0f3c6164575%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=8b30e8ca50064058bbaef0f3c6164575&alt=media&optimized=true","\u003Cp>Deputy CISO at Microsoft\u003C/p>\u003Cp>Former LinkedIn, Slack, Palantir\u003C/p>","Geoff Belknap","Push does for identity what CrowdStrike did for the endpoint.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F748f0ad0a5064a00a13f4721fcc8dea1",{},1742902158597,1728981782923,{"kind":28,"lastPreviewUrl":29,"breakpoints":161,"hasAutosaves":34},{"small":32,"medium":33},"6m09vxalhh",{"text":164,"url":165},"Download now","/resources/browser-attacks-report","resource","Learn about the latest techniques being used in the wild.","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b4a5ebf81d64e8c9d7fc35f6c96c4a9",{},1776255810913,1776255810900,[],[174,197],{"createdDate":175,"id":176,"name":139,"modelId":177,"published":13,"meta":178,"stageModifiedSincePublish":6,"query":180,"data":181,"variations":192,"lastUpdated":193,"firstPublished":194,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":195,"rev":196},1776256900280,"1f429607996e4e5fae8fe3f9b9610e55","4829faa81e7c4ee8bd2d000e160e8d3c",{"breakpoints":179,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[],{"testimonial":182,"link":191,"type":166,"title":139,"description":167,"image":168},{"@type":111,"id":145,"model":108,"value":183},{"query":184,"folders":185,"createdDate":149,"id":145,"name":150,"modelId":118,"published":13,"data":186,"variations":187,"lastUpdated":158,"firstPublished":159,"testRatio":23,"createdBy":91,"lastUpdatedBy":24,"meta":188,"rev":190},[],[],{"video":152,"jobTitle":153,"author":154,"qoute":29,"quote":155,"image":156},{},{"kind":28,"lastPreviewUrl":29,"breakpoints":189,"hasAutosaves":34},{"small":32,"medium":33},"a72g4wb2ipd",{"text":164,"url":165},{},1776256937553,1776256937540,[],"0zuy7vvuau4i",{"createdDate":198,"id":199,"name":200,"modelId":177,"published":13,"stageModifiedSincePublish":6,"query":201,"data":202,"variations":213,"lastUpdated":214,"firstPublished":215,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":216,"meta":217,"rev":196},1776256949234,"ce043785b71b4ece98eac811ecf4ba10","inductive-automation",[],{"link":203,"type":108,"testimonial":204,"testimonialLink":109},{},{"@type":111,"id":112,"model":108,"value":205},{"query":206,"folders":207,"createdDate":116,"id":112,"name":117,"modelId":118,"published":13,"data":208,"variations":209,"lastUpdated":124,"firstPublished":125,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"meta":210,"rev":212},[],[],{"author":120,"jobTitle":121,"quote":117,"image":122},{},{"kind":28,"lastPreviewUrl":29,"breakpoints":211,"hasAutosaves":34},{"small":32,"medium":33},"dtsrgqv3vi7",{},1776256974140,1776256974130,[],{"breakpoints":218,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},[220,404,523,642,760,880,1000,1120],{"createdDate":221,"id":222,"name":223,"modelId":224,"published":13,"stageModifiedSincePublish":6,"query":225,"data":231,"variations":392,"lastUpdated":393,"firstPublished":394,"testRatio":23,"screenshot":395,"createdBy":91,"lastUpdatedBy":396,"folders":397,"meta":398,"rev":403},1744829487099,"387451215c314dd5bd654668cdc1a197","Zero-day phishing","cca4143377554c5a9163cc203a8ed2ba",[226],{"@type":227,"property":228,"operator":229,"value":230},"@builder.io/core:Query","urlPath","is","/uc/zero-day-phishing-protection",{"inputs":232,"customFonts":233,"seoTitle":281,"title":281,"tsCode":29,"seoDescription":282,"fontAwesomeIcon":283,"jsCode":29,"blocks":284,"url":230,"state":389},[],[234],{"family":235,"kind":236,"version":237,"lastModified":238,"files":239,"category":258,"menu":259,"subsets":260,"variants":263},"DM Sans","webfonts#webfont","v14","2023-07-13",{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"800italic":248,"900italic":249,"700italic":250,"100italic":251,"italic":252,"regular":253,"200italic":254,"500italic":255,"300italic":256,"600italic":257},"https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAop1hTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwA_JxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAkJxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAfJthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwARZthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAIpthTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAC5thTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8gCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9uCm3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDG3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxhTmf3ZGMZpg.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat8JDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat-7DW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat_XDW3zRmYJpso5.ttf","https://fonts.gstatic.com/s/dmsans/v14/rP2rp2ywxg089UriCZaSExd86J3t9jz86Mvy4qCRAL19DksVat9XCm3zRmYJpso5.ttf","sans-serif","https://fonts.gstatic.com/s/dmsans/v14/rP2tp2ywxg089UriI5-g4vlH9VoD8CmcqZG40F9JadbnoEwAopxRT23z.ttf",[261,262],"latin","latin-ext",[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],"100","200","300","regular","500","600","800","900","100italic","200italic","300italic","italic","500italic","600italic","700italic","800italic","900italic","Zero-day phishing protection","Detect phishing TTPs directly in the browser and stop credential theft.","faFishingRod",[285,384],{"@type":47,"@version":48,"tagName":286,"id":287,"children":288},"div","builder-76c6b8d1499346c7bc1fd56ae4e93638",[289,306,314,321,333,348,359,370,376],{"@type":47,"@version":48,"layerName":290,"id":291,"component":292,"responsiveStyles":303},"UseCaseHero","builder-5228fe062bef4a40a91e43f1112832fa",{"name":290,"options":293,"isRSC":61},{"title":281,"description":294,"points":295,"video":302},"\u003Cp>Push detects phishing as it happens. Autonomous agents hunt for new phishing techniques, identify kit signatures, and deploy detections within minutes of a new attack being analyzed. From cloned login pages to AiTM credential harvesting, Push sees what traditional filters miss and stops threats before they escalate.\u003C/p>",[296,298,300],{"item":297},"Detect phishing that bypasses traditional filters, including AiTM, SSO password theft, and fake login pages",{"item":299},"Stop never-before-seen attacks with AI-native behavioral and on-page analysis inside the browser",{"item":301},"Investigate faster with unified browser, user, and page context","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F40433ceeb4f94b43a82e039a0f4fd411%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=40433ceeb4f94b43a82e039a0f4fd411&alt=media&optimized=true",{"large":304},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},"transparent",{"@type":47,"@version":48,"id":307,"component":308,"responsiveStyles":311},"builder-96634044407e491299e291ed64669e39",{"name":309,"options":310,"isRSC":61},"TrustedBy",{"AllPartners":34,"backgroundTransparent":6},{"large":312},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},"#000",{"@type":47,"@version":48,"id":315,"component":316,"responsiveStyles":319},"builder-2c3768f930534557bb8978e32b6a6a0f",{"name":317,"options":318,"isRSC":61},"Diagonal",{"darkMode":34},{"large":320},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"layerName":322,"id":323,"component":324,"responsiveStyles":331},"TextImageBlockVertical","builder-7c3c1c2840424db2ad2ccbfaf382dd64",{"name":322,"tag":322,"options":325,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":328,"description":329,"animatedTitle":29,"image":330,"reverse":6,"descriptionPaddingHorizontal":61},1200,800,"\u003Ch2>Why stop at the inbox?\u003C/h2>","\u003Cp>Phishing attacks have evolved. Whether attackers lure users with QR codes, instant messages, or OAuth consent screens, the outcome is the same: it plays out in the browser. Push gives you real-time detection for in-browser threats, stopping phishing and consent-based attacks before they lead to compromise\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7fdcac241f0e4a049166d7076858adeb",{"large":332},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":334,"component":335,"responsiveStyles":343},"builder-41c978b3669749cf947e622b4e79e4d7",{"name":336,"options":337,"isRSC":61},"TextImageBlockHorizontal",{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":340,"description":341,"reverse":34,"image":342},600,100,"\u003Cp>Detect phishing at the edge\u003C/p>","\u003Cp>Push uses industry-first telemetry to detect phishing based on behavior, not static indicators. Autonomous agents analyze how phishing pages behave and how users interact with them, uncovering fake logins, credential theft, and phishing kits the moment they load in the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9df3d180c97b4e61af142af2ccd68721",{"large":344},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":346,"marginTop":347},"DM Sans, sans-serif","20px","0px",{"@type":47,"@version":48,"id":349,"component":350,"responsiveStyles":356},"builder-d2a7bc941feb43cdb898bc116b203cf9",{"name":336,"options":351,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":353,"description":354,"reverse":6,"image":355},120,"\u003Ch2>Go beyond blocklists and IOCs\u003C/h2>","\u003Cp>Push goes beyond URLs and easy-to-change indicators. It reads the full phishing playbook like script behavior, session hijacks, DOM changes, user inputs, then connects the dots in real time. This gives your team a complete picture of how the phishing attempt worked, not just an alert.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fabfd58db169b433e96d3f1261797156e",{"large":357},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},"36px",{"@type":47,"@version":48,"layerName":336,"id":360,"component":361,"responsiveStyles":367},"builder-42c32198083f4880acb37c5cb76934da",{"name":336,"options":362,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":364,"description":365,"reverse":34,"image":366},140,"\u003Ch2>Enhance your phishing response\u003C/h2>","\u003Cp>When phishing enters your environment, speed matters. Push gives you instant access to the telemetry that counts like session data, user behavior, and page activity, so you can investigate fast, trigger in-browser prompts, or forward alerts to your SIEM or SOAR for response. All in real time, right from the browser.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbb195aec46904056b85e8688629e558e",{"large":368},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},"47px",{"@type":47,"@version":48,"id":371,"component":372,"responsiveStyles":374},"builder-9a95b9cbc4854421a92ef7b90f6c7adb",{"name":317,"options":373,"isRSC":61},{"darkMode":6},{"large":375},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":377,"component":378,"responsiveStyles":382},"builder-0afa17a9f25c4661a90f314d5578aa18",{"name":379,"tag":379,"options":380,"isRSC":61},"LatestResources",{"sectionHeading":29,"customClass":381},"bg-black",{"large":383},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":385,"@type":47,"tagName":74,"properties":386,"responsiveStyles":387},"builder-pixel-3i0zh6ntgct",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":388},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":390},{"path":29,"query":391},{},{},1776275046831,1745499158657,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fff60c30a8442489c8ed7e0af9599d14f","kYgMv6WsbvfmlOUYqR2SFwGzw6e2",[],{"lastPreviewUrl":399,"winningTest":61,"breakpoints":400,"kind":401,"hasLinks":6,"originalContentId":402,"hasAutosaves":6},"https://pushsecurity.com/uc/zero-day-phishing-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=387451215c314dd5bd654668cdc1a197&builder.overrides.387451215c314dd5bd654668cdc1a197=387451215c314dd5bd654668cdc1a197&builder.overrides.use-case-page:/uc/zero-day-phishing-protection=387451215c314dd5bd654668cdc1a197&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},"page","2daa5670b8504fc7ba4700633e8bd921","aqn6791janc",{"createdDate":405,"id":406,"name":407,"modelId":224,"published":13,"stageModifiedSincePublish":6,"query":408,"data":411,"variations":515,"lastUpdated":516,"firstPublished":517,"testRatio":23,"screenshot":518,"createdBy":91,"lastUpdatedBy":396,"folders":519,"meta":520,"rev":403},1756833377777,"54f8256648f54d439303734b1e69221b","Browser extension security",[409],{"@type":227,"property":228,"operator":229,"value":410},"/uc/browser-extension-security",{"seoDescription":412,"jsCode":29,"fontAwesomeIcon":413,"tsCode":29,"title":407,"seoTitle":407,"customFonts":414,"inputs":419,"blocks":420,"url":410,"state":512},"Shine a light on risky browser extensions.","faPuzzlePiece",[415],{"kind":236,"family":235,"version":237,"files":416,"category":258,"lastModified":238,"subsets":417,"variants":418,"menu":259},{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"100italic":251,"italic":252,"regular":253,"900italic":249,"800italic":248,"700italic":250,"200italic":254,"300italic":256,"500italic":255,"600italic":257},[261,262],[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],[],[421,507],{"@type":47,"@version":48,"tagName":286,"id":422,"meta":423,"children":424},"builder-71d0648c1d2f4ede8d0d0b5b28b7b94c",{"previousId":287},[425,441,448,455,464,474,484,494,501],{"@type":47,"@version":48,"id":426,"meta":427,"component":428,"responsiveStyles":439},"builder-ff325b4b8fad4edea53f38865947e854",{"previousId":291},{"name":290,"options":429,"isRSC":61},{"title":407,"description":430,"points":431,"video":438},"\u003Cp>Browser extensions introduce new code, new permissions, and new potential for risk. Many include AI features, and most go completely unnoticed. Push gives you full visibility into every extension used across your workforce, across major browsers, so you can uncover shadow IT, assess risky permissions, and block unsafe tools before they lead to compromise.\u003C/p>",[432,434,436],{"item":433},"Discover every browser extension in use",{"item":435},"Spot risky or unsanctioned behavior",{"item":437},"Make informed decisions on extension policy","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc538aad95d7f403aa3c3551af72f67c0?alt=media&token=1411fa6d-2eac-4e6c-94bf-ea117da12d67&apiKey=f3a1111ff5be48cdbb123cd9f5795a05",{"large":440},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":442,"meta":443,"component":444,"responsiveStyles":446},"builder-fb89d128c64e47cf9cbb11d90fc24523",{"previousId":307},{"name":309,"options":445,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":447},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":449,"meta":450,"component":451,"responsiveStyles":453},"builder-54388d35126c4d0096eeebaf8c4448cd",{"previousId":315},{"name":317,"options":452,"isRSC":61},{"darkMode":34},{"large":454},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"layerName":322,"id":456,"component":457,"responsiveStyles":462},"builder-3c8fa6785dd6466abf52a2470d66d85a",{"name":322,"tag":322,"options":458,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":459,"description":460,"image":461,"reverse":6},"\u003Ch2>Take control of browser extensions\u003C/h2>","\u003Cp>Attackers are increasingly using malicious browser extensions to gain access to data processed and stored in the browser. And the problem is, most security teams have no visibility into what extensions are being used. Push changes that. With browser-native telemetry, the Push extension continuously inventories browser extensions across your environment, flags the risky ones, and gives you intelligence to act.&nbsp;\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0a004f16a6874f4c8fdf14344acc9fec",{"large":463},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":465,"meta":466,"component":467,"responsiveStyles":472},"builder-93738f98109a4009affb349afd7bb182",{"previousId":334},{"name":336,"options":468,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":469,"description":470,"reverse":34,"image":471},"\u003Ch2>Discover every extension in use\u003C/h2>","\u003Cp>Push gives you structured, searchable data about every extension in your environment, so you’re not just seeing what’s there, but also understanding how it got there, what it can do, and who it affects. It’s the kind of granular insight that’s nearly impossible to get from traditional tools, and it lays the groundwork for better policy decisions and faster investigations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0e5727ca99474f14b1b7916bf6bbb782",{"large":473},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":346,"marginTop":347},{"@type":47,"@version":48,"id":475,"meta":476,"component":477,"responsiveStyles":482},"builder-83393acb12ee4fdd840839185b51edb4",{"previousId":349},{"name":336,"options":478,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":479,"description":480,"reverse":6,"image":481},"\u003Ch2>Spot risky or malicious extensions\u003C/h2>","\u003Cp>Push highlights extensions with dangerous permissions, broad access, or poor reputations. This includes AI extensions that request access far beyond what their stated purpose requires. You can quickly detect sideloaded, manually installed, or development-mode extensions that bypass normal controls. And because Push shows you who’s using them and where, you can respond precisely and effectively.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa104d58c8da34fbb8901f738fb21453b",{"large":483},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":485,"meta":486,"component":487,"responsiveStyles":492},"builder-da98e3de949646d89c53a0d1c2784664",{"previousId":360},{"name":336,"options":488,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":489,"description":490,"reverse":34,"image":491},"\u003Ch2>Accelerate security reviews\u003C/h2>","\u003Cp>Most teams have extension policies, they just don’t have the data to enforce them. Push reveals how each extension entered your environment, whether it was installed manually, sideloaded, or deployed in dev mode. You’ll see which users are running what, and where, so you can surface violations, investigate quickly, and respond with confidence.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F229f355be6f243b180f410d237a75bb3",{"large":493},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":495,"meta":496,"component":497,"responsiveStyles":499},"builder-1a689287d1a1418997d57db578a71105",{"previousId":371},{"name":317,"options":498,"isRSC":61},{"darkMode":6},{"large":500},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":502,"component":503,"responsiveStyles":505},"builder-feb4e75029f84c10b6498ef1f8f79128",{"name":379,"tag":379,"options":504,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":506},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":508,"@type":47,"tagName":74,"properties":509,"responsiveStyles":510},"builder-pixel-pwc1jocm33c",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":511},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":513},{"path":29,"query":514},{},{},1776275365038,1757000441666,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F8d496cf111644ee5afcc046b72d1ca5a",[],{"kind":401,"winningTest":61,"breakpoints":521,"lastPreviewUrl":522,"hasLinks":6,"originalContentId":222,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/uc/browser-extension-security?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=54f8256648f54d439303734b1e69221b&builder.overrides.54f8256648f54d439303734b1e69221b=54f8256648f54d439303734b1e69221b&builder.overrides.use-case-page:/uc/browser-extension-security=54f8256648f54d439303734b1e69221b&builder.options.locale=Default",{"createdDate":524,"id":525,"name":526,"modelId":224,"published":13,"query":527,"data":530,"variations":633,"lastUpdated":634,"firstPublished":635,"testRatio":23,"screenshot":636,"createdBy":91,"lastUpdatedBy":637,"folders":638,"meta":639,"rev":403},1744923509705,"94bebb7bb99d48629ad157e80cf4d81d","Account takeover detection",[528],{"@type":227,"property":228,"operator":229,"value":529},"/uc/account-takeover-detection",{"title":526,"customFonts":531,"jsCode":29,"seoTitle":526,"seoDescription":536,"fontAwesomeIcon":537,"tsCode":29,"blocks":538,"url":529,"state":630},[532],{"kind":236,"category":258,"variants":533,"menu":259,"files":534,"family":235,"subsets":535,"version":237,"lastModified":238},[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"300italic":256,"500italic":255,"800italic":248,"700italic":250,"italic":252,"900italic":249,"600italic":257,"200italic":254,"regular":253,"100italic":251},[261,262],"Stop ATO with stolen credential and compromised token detection.","faUserSecret",[539,625],{"@type":47,"@version":48,"tagName":286,"id":540,"meta":541,"children":542},"builder-e7913a774cae44c5a23d6081c5c30a52",{"previousId":287},[543,559,566,573,582,592,602,612,619],{"@type":47,"@version":48,"id":544,"meta":545,"component":546,"responsiveStyles":557},"builder-f1f1ab1601bc4c0f8c2a8aafd173675d",{"previousId":291},{"name":290,"options":547,"isRSC":61},{"title":526,"description":548,"points":549,"video":556},"\u003Cp>Attackers don’t need to phish, they just need a password that works. Push monitors for signs of credential-based attacks in real time, directly in the browser, catching account takeover attempts before the damage spreads. From ghost logins to credential stuffing, Push cuts off the paths attackers use to quietly slip in the back door.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[550,552,554],{"item":551},"Identify credential-based ATO as it unfolds",{"item":553},"Surface hijacked sessions and token misuse",{"item":555},"Strengthen authentication where your IdP can’t","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb4dd9db24bc9495b8a686b1b4d492016%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=b4dd9db24bc9495b8a686b1b4d492016&alt=media&optimized=true",{"large":558},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":560,"meta":561,"component":562,"responsiveStyles":564},"builder-0bc0d1c78ece4994993c3a6427a4d533",{"previousId":307},{"name":309,"options":563,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":565},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":567,"meta":568,"component":569,"responsiveStyles":571},"builder-e45de8f3768c4f16938dbf78e4e87524",{"previousId":315},{"name":317,"options":570,"isRSC":61},{"darkMode":34},{"large":572},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":574,"component":575,"responsiveStyles":580},"builder-c98e8bfd341146c1b67c02d5698ff093",{"name":322,"tag":322,"options":576,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":577,"description":578,"image":579,"reverse":6},"\u003Ch2>Assume less. See more.\u003C/h2>","\u003Cp>Most account takeovers don’t start with a breach, they start with a login. Whether it’s a reused password, a local account, or an outdated login flow, Push shows you how accounts are actually accessed day to day, not just how policies say they should be. That means no more blind spots around ghost logins, bypassed SSO, or stale access paths that quietly persist.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F18630ad2746d4eb7b7fcc0428b11a8f0",{"large":581},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":583,"meta":584,"component":585,"responsiveStyles":590},"builder-55c1fc38ddc04fd1a0d6a8e2fb819e00",{"previousId":334},{"name":336,"options":586,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":587,"description":588,"reverse":34,"image":589},"\u003Ch2>Catch stolen credential use in real time\u003C/h2>","\u003Cp>Push monitors login activity directly in the browser to detect signs of credential-based attacks like leaked password use or suspicious login flows. By analyzing attacker TTPs instead of relying on known indicators, Push spots credential stuffing and account takeover attempts the moment they begin, not after they’ve succeeded.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F52b0123cac2c4dfdb1dc0af6adf9d603",{"large":591},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":347,"marginTop":347},{"@type":47,"@version":48,"id":593,"meta":594,"component":595,"responsiveStyles":600},"builder-dfb31737b30948c6b95323655d571a50",{"previousId":349},{"name":336,"options":596,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":597,"description":598,"reverse":6,"image":599},"\u003Ch2>Detect session hijacks and stealth access\u003C/h2>","\u003Cp>Attackers don’t always need a login screen, they often sidestep it entirely using stolen session tokens. Push detects when valid sessions are reused in unexpected ways, identifying hijacked sessions and stealth access attempts that traditional tools miss. Because we monitor directly in the browser, you see what’s happening inside active sessions in real time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F94a6859a99e04d309ffe5841f3dbdf5c",{"large":601},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":603,"meta":604,"component":605,"responsiveStyles":610},"builder-f7585b90eb974d03a7dc7eae5b58d227",{"previousId":360},{"name":336,"options":606,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":607,"description":608,"reverse":34,"image":609},"\u003Ch2>Harden accounts before they’re compromised\u003C/h2>","\u003Cp>Push goes beyond alerts. It identifies apps that still allow local logins, even when SSO is configured, so you can remove weak access paths. Push also flags users without MFA, reused work credentials, or weak passwords, and prompts users in-browser to fix risky behaviors before they’re exploited.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01c1b638f1b6497093a4f2b8ceddb5bb",{"large":611},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":613,"meta":614,"component":615,"responsiveStyles":617},"builder-ad81d1e3afec49a791214194eae09bdc",{"previousId":371},{"name":317,"options":616,"isRSC":61},{"darkMode":6},{"large":618},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":620,"component":621,"responsiveStyles":623},"builder-8dac1aa4b9d148628d92252bd8eff822",{"name":379,"tag":379,"options":622,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":624},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":626,"@type":47,"tagName":74,"properties":627,"responsiveStyles":628},"builder-pixel-c3ck5is18yk",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":629},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":631},{"path":29,"query":632},{},{},1770892814499,1745499162732,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F58b660fa94aa4b30b0faeb9b663ae41a","SfUPqW5tkibIPby49keNFMdHFTr1",[],{"lastPreviewUrl":640,"hasLinks":6,"originalContentId":222,"breakpoints":641,"winningTest":61,"kind":401,"hasAutosaves":34},"https://pushsecurity.com/uc/account-takeover-detection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.94bebb7bb99d48629ad157e80cf4d81d=94bebb7bb99d48629ad157e80cf4d81d&builder.overrides.use-case-page:/uc/account-takeover-detection=94bebb7bb99d48629ad157e80cf4d81d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":643,"id":644,"name":645,"modelId":224,"published":13,"query":646,"data":649,"variations":752,"lastUpdated":753,"firstPublished":754,"testRatio":23,"screenshot":755,"createdBy":91,"lastUpdatedBy":637,"folders":756,"meta":757,"rev":403},1745009370904,"23eb48fb56d3451cab77cb6ed140ee6d","Attack path hardening",[647],{"@type":227,"property":228,"operator":229,"value":648},"/uc/attack-path-hardening",{"tsCode":29,"seoDescription":650,"jsCode":29,"customFonts":651,"fontAwesomeIcon":656,"seoTitle":645,"title":645,"blocks":657,"url":648,"state":749},"Harden access paths with visibility,  detection, and guardrails.",[652],{"kind":236,"files":653,"version":237,"lastModified":238,"subsets":654,"menu":259,"category":258,"variants":655,"family":235},{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"regular":253,"italic":252,"800italic":248,"500italic":255,"600italic":257,"200italic":254,"900italic":249,"700italic":250,"100italic":251,"300italic":256},[261,262],[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],"faRadar",[658,744],{"@type":47,"@version":48,"tagName":286,"id":659,"meta":660,"children":661},"builder-1d8553eddcaa44d7bba9e2f4ca13af2a",{"previousId":540},[662,678,685,692,701,711,721,731,738],{"@type":47,"@version":48,"id":663,"meta":664,"component":665,"responsiveStyles":676},"builder-84fe3d7c85a743cf8cef649aa974f1ef",{"previousId":544},{"name":290,"options":666,"isRSC":61},{"title":645,"description":667,"points":668,"video":675},"\u003Cp>Push continuously monitors your environment for exposed login paths, weak credentials, and missing protections like MFA. It detects the gaps attackers exploit and helps you close them before they’re used.\u003C/p>",[669,671,673],{"item":670},"Find weak spots like reused passwords, local logins, and missing MFA",{"item":672},"Monitor how users actually log in across apps, flows, and tools",{"item":674},"Enforce secure access with in-browser guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fdbdcf52892034f1bbddded77f753a343%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=dbdcf52892034f1bbddded77f753a343&alt=media&optimized=true",{"large":677},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":679,"meta":680,"component":681,"responsiveStyles":683},"builder-b3f66f5b08054cc78a06fecfc3ae2337",{"previousId":560},{"name":309,"options":682,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":684},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":686,"meta":687,"component":688,"responsiveStyles":690},"builder-4c73418b84be49ed85e6e13d2625c5a0",{"previousId":567},{"name":317,"options":689,"isRSC":61},{"darkMode":34},{"large":691},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":693,"component":694,"responsiveStyles":699},"builder-dec0246085e1485c803f7152b1922a81",{"name":322,"tag":322,"options":695,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":696,"description":697,"image":698,"reverse":6},"\u003Ch2>Find the gaps that lead to compromise\u003C/h2>","\u003Cp>Misconfigurations don’t show up in your config files, they show up in how users actually access apps. Push monitors real login behavior in the browser, surfacing risky patterns like local login access, duplicate accounts, or missing protections that leave doors wide open.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F309a59bba8d247a19476bb369397460e",{"large":700},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":702,"meta":703,"component":704,"responsiveStyles":709},"builder-ebf049a645604a249550996a88f8f3b6",{"previousId":583},{"name":336,"options":705,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":706,"description":707,"reverse":34,"image":708},"\u003Ch2>See real login behavior\u003C/h2>","\u003Cp>Push watches authentication flows as they happen, giving you a live view of how users log in, which methods they choose, and where protections like MFA are missing. Plus, uncover every app and account in use, even shadow IT you didn’t know existed, without relying on stale config files or IdP assumptions. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb51f6b0357cc451b87a7a5016d984e5e",{"large":710},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":346,"marginTop":347},{"@type":47,"@version":48,"id":712,"meta":713,"component":714,"responsiveStyles":719},"builder-431d175c59004669b0b2776b07d71737",{"previousId":593},{"name":336,"options":715,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":716,"description":717,"reverse":6,"image":718},"\u003Ch2>Find and fix posture drift\u003C/h2>","\u003Cp>Security posture isn’t static. Push continuously monitors for issues like missing MFA or legacy login methods. When something falls out of policy, you know immediately with custom notifications so you can act before it turns into risk.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F324e39127dfc41e592b1183dfb39892d",{"large":720},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":722,"meta":723,"component":724,"responsiveStyles":729},"builder-3dffdcbe0a484e2ca4c03f019b6d40ee",{"previousId":603},{"name":336,"options":725,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":726,"description":727,"reverse":34,"image":728},"\u003Ch2>Guide users with in-browser guardrails\u003C/h2>","\u003Cp>Push doesn’t just surface problems, it helps you fix them. When users sign in without MFA, reuse a password, or use insecure credentials, Push prompts them directly in the browser to secure their access. It’s faster, more effective, and actually gets results.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fee8b75d13e45488aba55434a8b49ebb0",{"large":730},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":732,"meta":733,"component":734,"responsiveStyles":736},"builder-976bc222cd7647ff905f1e01cfedc453",{"previousId":613},{"name":317,"options":735,"isRSC":61},{"darkMode":6},{"large":737},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":739,"component":740,"responsiveStyles":742},"builder-8c47ec2fd0f74382bb3e6c870555632c",{"name":379,"tag":379,"options":741,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":743},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":745,"@type":47,"tagName":74,"properties":746,"responsiveStyles":747},"builder-pixel-i8hfaar5ap",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":748},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":750},{"path":29,"query":751},{},{},1770892844854,1745499166112,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ca12bf728a045f1a31d40c0beb3bfe5",[],{"kind":401,"lastPreviewUrl":758,"breakpoints":759,"hasLinks":6,"originalContentId":525,"winningTest":61,"hasAutosaves":34},"https://pushsecurity.com/uc/attack-path-hardening?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.23eb48fb56d3451cab77cb6ed140ee6d=23eb48fb56d3451cab77cb6ed140ee6d&builder.overrides.use-case-page:/uc/attack-path-hardening=23eb48fb56d3451cab77cb6ed140ee6d&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":761,"id":762,"name":763,"modelId":224,"published":13,"query":764,"data":767,"variations":872,"lastUpdated":873,"firstPublished":874,"testRatio":23,"screenshot":875,"createdBy":91,"lastUpdatedBy":637,"folders":876,"meta":877,"rev":403},1761675020232,"ea4f309d2ffe46c5aa97ebf0fda4e2e3","ClickFix Protection",[765],{"@type":227,"property":228,"operator":229,"value":766},"/uc/clickfix-protection",{"seoDescription":768,"fontAwesomeIcon":769,"customFonts":770,"seoTitle":775,"jsCode":29,"tsCode":29,"title":775,"blocks":776,"url":766,"state":869},"Block attacks that trick users into running malicious code.","faLaptopCode",[771],{"files":772,"subsets":773,"menu":259,"version":237,"kind":236,"family":235,"lastModified":238,"variants":774,"category":258},{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"200italic":254,"800italic":248,"700italic":250,"600italic":257,"100italic":251,"italic":252,"regular":253,"300italic":256,"500italic":255,"900italic":249},[261,262],[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],"ClickFix protection",[777,864],{"@type":47,"@version":48,"tagName":286,"id":778,"meta":779,"children":780},"builder-d7eefdde0f2a4b2b9de3dcb2978fd6cb",{"previousId":659},[781,797,804,811,821,831,841,851,858],{"@type":47,"@version":48,"id":782,"meta":783,"component":784,"responsiveStyles":795},"builder-56e2c54bcce040a4af8b92ae03706c12",{"previousId":663},{"name":290,"options":785,"isRSC":61},{"title":775,"description":786,"points":787,"image":794},"\u003Cp>ClickFix attacks are one of the fastest-growing threats, tricking users into copying malicious code from a webpage and running it locally. This technique bypasses traditional EDR, email gateways, and network filters, leading directly to ransomware and data theft. Push stops this attack at the source, in the browser, by detecting and blocking the malicious behavior before the user can ever paste the code.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[788,790,792],{"item":789},"Detect ClickFix, FileFix, and fake CAPTCHA in the browser",{"item":791},"Block malicious copy-and-paste actions before code is executed",{"item":793},"See full telemetry into which users were targeted and what they saw","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7b74af62889847ebb3927364485b0546",{"large":796},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":798,"meta":799,"component":800,"responsiveStyles":802},"builder-05f9614d4e3e4dc88b3ee8658f54e10e",{"previousId":679},{"name":309,"options":801,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":803},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":805,"meta":806,"component":807,"responsiveStyles":809},"builder-c4fb5179366243c1b6c32d368675cf47",{"previousId":686},{"name":317,"options":808,"isRSC":61},{"darkMode":34},{"large":810},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":812,"meta":813,"component":814,"responsiveStyles":819},"builder-261af50705fd445d8cca4a6ba20d5391",{"previousId":693},{"name":322,"tag":322,"options":815,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":816,"description":817,"reverse":6,"image":818},"\u003Ch2>Stop ClickFix-style attacks before they become a breach\u003C/h2>","\u003Cp>Traditional security tools are blind to malicious copy and paste attacks because the attack exploits a gap between the browser and the endpoint. EDR only sees the payload after it runs, and network tools see only part of the picture.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F98b2f7e08dec4eafaf8e24937605b8cf",{"large":820},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":822,"meta":823,"component":824,"responsiveStyles":829},"builder-7d21b8aab8064c40b1e5dd23c4749309",{"previousId":702},{"name":336,"options":825,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":826,"description":827,"reverse":34,"image":828},"\u003Ch2>Discover lures at the source\u003C/h2>","\u003Cp>Push inspects page behavior to identify ClickFix attacks as they happen. By inspecting the page, its structure, and how the user interacts with it, Push can detect and block these in-browser threats in real time. This deep, TTP-based inspection spots the trap even on novel pages that are built to bypass traditional web filters and blocklists.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F665bf47e01544c75bf9ddafd3917927b",{"large":830},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":346,"marginTop":347},{"@type":47,"@version":48,"id":832,"meta":833,"component":834,"responsiveStyles":839},"builder-fb91943adf6149259ed9e1e6566c9afe",{"previousId":712},{"name":336,"options":835,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":836,"description":837,"reverse":6,"image":838},"\u003Ch2>Block the malicious action\u003C/h2>","\u003Cp>When Push detects a malicious script, it intercepts the user's action and blocks the code from being copied to the clipboard. The user is protected, the attack is stopped, and no malicious code ever reaches the endpoint. Unlike broad DLP tools, this action is surgical, targeting only malicious behavior without disrupting normal work.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5ee68f81f1ac416685cbfe91298cf827",{"large":840},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":842,"meta":843,"component":844,"responsiveStyles":849},"builder-bfac95fada864e5a8259b955b5b5f98b",{"previousId":722},{"name":336,"options":845,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":846,"description":847,"reverse":34,"image":848},"\u003Ch2>Accelerate ClickFix investigations\u003C/h2>","\u003Cp>When an attack happens, knowing what the user saw or did is critical. Push provides rich browser session data for rapid investigation and containment. Security teams get detailed telemetry on which users were targeted, what lure they were served, and when the block occurred. This enables defenders to reconstruct what happened and respond quickly, even when other tools miss the activity entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6cdf2a8aeddc4e9a9023cbf974e40239",{"large":850},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":852,"meta":853,"component":854,"responsiveStyles":856},"builder-136892e831684a6987f87d3be67c33d1",{"previousId":732},{"name":317,"options":855,"isRSC":61},{"darkMode":6},{"large":857},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":859,"component":860,"responsiveStyles":862},"builder-dec26b739f2f42beb5a73cfc6c675b60",{"name":379,"tag":379,"options":861,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":863},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":865,"@type":47,"tagName":74,"properties":866,"responsiveStyles":867},"builder-pixel-3zph7um9hly",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":868},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":870},{"path":29,"query":871},{},{},1770892881888,1761847585203,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F375467b8bef34ed1a8a1cc5b8b67d75f",[],{"lastPreviewUrl":878,"originalContentId":644,"winningTest":61,"hasLinks":6,"kind":401,"breakpoints":879,"hasAutosaves":6},"https://pushsecurity.com/uc/clickfix-protection?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.ea4f309d2ffe46c5aa97ebf0fda4e2e3=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.overrides.use-case-page:/uc/clickfix-protection=ea4f309d2ffe46c5aa97ebf0fda4e2e3&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":881,"id":882,"name":883,"modelId":224,"published":13,"query":884,"data":887,"variations":992,"lastUpdated":993,"firstPublished":994,"testRatio":23,"screenshot":995,"createdBy":91,"lastUpdatedBy":637,"folders":996,"meta":997,"rev":403},1745009743870,"a9d5556e77f84a37b5bd52310a7110c1","Incident response",[885],{"@type":227,"property":228,"operator":229,"value":886},"/uc/incident-response",{"seoDescription":888,"customFonts":889,"title":883,"jsCode":29,"fontAwesomeIcon":894,"seoTitle":895,"tsCode":29,"blocks":896,"url":886,"state":989},"Investigate and respond faster with unique browser telemetry.",[890],{"kind":236,"subsets":891,"menu":259,"variants":892,"category":258,"family":235,"version":237,"lastModified":238,"files":893},[261,262],[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"900italic":249,"600italic":257,"200italic":254,"300italic":256,"100italic":251,"700italic":250,"800italic":248,"regular":253,"italic":252,"500italic":255},"faSatelliteDish","Browser based incident response",[897,984],{"@type":47,"@version":48,"tagName":286,"id":898,"meta":899,"children":900},"builder-653c4aed737b4def88dc4cd2d695660a",{"previousId":659},[901,918,925,932,941,951,961,971,978],{"@type":47,"@version":48,"id":902,"meta":903,"component":904,"responsiveStyles":916},"builder-18190bd36518467d9154d27d7e945b9b",{"previousId":663},{"name":290,"options":905,"isRSC":61},{"title":906,"description":907,"points":908,"video":915},"Browser-based incident response","\u003Cp>Push gives you real-time visibility into what actually happened during a breach, right in the browser where the attack played out. From credential theft to session hijacking, Push captures high-fidelity telemetry so you can investigate quickly, contain confidently, and shut it down before it spreads.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>",[909,911,913],{"item":910},"Reconstruct what happened with real browser session context",{"item":912},"Investigate faster with real-world session context",{"item":914},"Trigger response actions automatically through your SIEM or SOAR","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd00e39d3b6e346c296261d875cf55652%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=d00e39d3b6e346c296261d875cf55652&alt=media&optimized=true",{"large":917},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":919,"meta":920,"component":921,"responsiveStyles":923},"builder-8a0a8ea63f5d48dd8a6726f2d49cf0ca",{"previousId":679},{"name":309,"options":922,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":924},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":926,"meta":927,"component":928,"responsiveStyles":930},"builder-2df65c3f54334df2b26e7cb744886cdc",{"previousId":686},{"name":317,"options":929,"isRSC":61},{"darkMode":34},{"large":931},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":933,"component":934,"responsiveStyles":939},"builder-2c32c869efc2423ab69ef06b150e9f97",{"name":322,"tag":322,"options":935,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":936,"description":937,"image":938,"reverse":6},"\u003Ch2>See attacks unfold, not just their aftermath\u003C/h2>","\u003Cp>Attacks happen in the browser, not in logs. Push captures what traditional tools miss: what users clicked, what loaded, what was entered, and how attackers moved. That gives you real-world evidence, not just assumptions, when every second matters.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F36fc719bd1de4a38b916f4d25c81a26d",{"large":940},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":942,"meta":943,"component":944,"responsiveStyles":949},"builder-370e53c6016e432db01e9193a2ce90f6",{"previousId":702},{"name":336,"options":945,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":946,"description":947,"reverse":34,"image":948},"\u003Ch2>Investigate faster with high-fidelity data\u003C/h2>","\u003Cp>Reconstructing an incident shouldn’t feel like guesswork. Push records detailed telemetry from inside the browser: page loads, credential inputs, DOM changes, session activity, user behavior. It’s structured, exportable, and ready to plug into your investigation workflows, so you can move fast without digging through proxy logs or relying on user reports.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fa6adda040e684e67a8d68a55c5ce5f6d",{"large":950},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":347,"marginTop":347},{"@type":47,"@version":48,"id":952,"meta":953,"component":954,"responsiveStyles":959},"builder-a7f3767a8d184bd08fb24520bf210e95",{"previousId":712},{"name":336,"options":955,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":956,"description":957,"reverse":6,"image":958},"\u003Ch2>Contain and respond in real time\u003C/h2>","\u003Cp>When something looks off, Push doesn’t just alert you, it gives you options. Guide users with in-browser prompts. Terminate sessions. Trigger SOAR workflows. Enrich SIEM alerts. Push gives you the context and control to stop spread before it starts.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb3dedeed5aba4847a2c2d22e10d0ec12",{"large":960},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":962,"meta":963,"component":964,"responsiveStyles":969},"builder-b92036ee0ece4b32acdbdcc7c377366b",{"previousId":722},{"name":336,"options":965,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":966,"description":967,"reverse":34,"image":968},"\u003Ch2>Prevent the next one\u003C/h2>","\u003Cp>Push helps you respond fast, but it also helps you fix what went wrong. It surfaces misconfigurations and risky behaviors that made the attack possible in the first place, then guides users in-browser to remediate. One tool. Full loop. No loose ends.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fc1ecc2d5d3814b62b072fac01827ff96",{"large":970},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":972,"meta":973,"component":974,"responsiveStyles":976},"builder-5e8ae39655274de89da32ab573a2525a",{"previousId":732},{"name":317,"options":975,"isRSC":61},{"darkMode":6},{"large":977},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":979,"component":980,"responsiveStyles":982},"builder-dfd6850cfb4741d2b8a0c16c2780f00a",{"name":379,"tag":379,"options":981,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":983},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":985,"@type":47,"tagName":74,"properties":986,"responsiveStyles":987},"builder-pixel-o60ck5x1w4k",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":988},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":990},{"path":29,"query":991},{},{},1770892908052,1745427419274,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb07017bfd318431690a5bb35bda35b99",[],{"kind":401,"breakpoints":998,"originalContentId":644,"winningTest":61,"lastPreviewUrl":999,"hasLinks":6,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/uc/incident-response?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.a9d5556e77f84a37b5bd52310a7110c1=a9d5556e77f84a37b5bd52310a7110c1&builder.overrides.use-case-page:/uc/incident-response=a9d5556e77f84a37b5bd52310a7110c1&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"createdDate":1001,"id":1002,"name":1003,"modelId":224,"published":13,"query":1004,"data":1007,"variations":1112,"lastUpdated":1113,"firstPublished":1114,"testRatio":23,"screenshot":1115,"createdBy":91,"lastUpdatedBy":637,"folders":1116,"meta":1117,"rev":403},1746122471259,"5f118e24433d46ceb79f5099987156d7","Shadow SaaS",[1005],{"@type":227,"property":228,"operator":229,"value":1006},"/uc/shadow-saas",{"seoTitle":1008,"seoDescription":1009,"customFonts":1010,"fontAwesomeIcon":1015,"title":1016,"jsCode":29,"tsCode":29,"blocks":1017,"url":1006,"state":1109},"Find and secure shadow SaaS","See and control shadow SaaS in the browser.",[1011],{"kind":236,"variants":1012,"files":1013,"family":235,"version":237,"subsets":1014,"lastModified":238,"category":258,"menu":259},[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"300italic":256,"500italic":255,"regular":253,"900italic":249,"italic":252,"100italic":251,"200italic":254,"600italic":257,"700italic":250,"800italic":248},[261,262],"faShieldCheck","Secure shadow SaaS",[1018,1104],{"@type":47,"@version":48,"tagName":286,"id":1019,"meta":1020,"children":1021},"builder-04da805c4cd34652a2db452fcda52e1d",{"previousId":898},[1022,1038,1045,1052,1061,1071,1081,1091,1098],{"@type":47,"@version":48,"id":1023,"meta":1024,"component":1025,"responsiveStyles":1036},"builder-830d414faeaf41439142f9157e8288c8",{"previousId":902},{"name":290,"options":1026,"isRSC":61},{"title":1008,"description":1027,"points":1028,"video":1035},"\u003Cp>SaaS sprawl is one of today’s fastest-growing security blind spots because most tools monitor around the edges. Push sees it at the source, in the browser, revealing every app users access, flagging risky tools, and helping you shut down exposure before it leads to a breach. No guesswork. No nasty surprises. Just real-time visibility and control.\u003C/p>",[1029,1031,1033],{"item":1030},"Discover every SaaS app users access, managed or not",{"item":1032},"Spot accounts with weak security postures like missing MFA, unmanaged access, and no SSO",{"item":1034},"Control usage with in-browser prompts, blocks, and security guardrails","https://cdn.builder.io/o/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e4eece318d04d6586e691d59d0741cf%2Fcompressed?apiKey=f3a1111ff5be48cdbb123cd9f5795a05&token=3e4eece318d04d6586e691d59d0741cf&alt=media&optimized=true",{"large":1037},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":1039,"meta":1040,"component":1041,"responsiveStyles":1043},"builder-cd7833f966cb4c7e8adf0d6c979414a6",{"previousId":919},{"name":309,"options":1042,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":1044},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":1046,"meta":1047,"component":1048,"responsiveStyles":1050},"builder-49d720b45430454e8b08c526f267c19f",{"previousId":926},{"name":317,"options":1049,"isRSC":61},{"darkMode":34},{"large":1051},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1053,"component":1054,"responsiveStyles":1059},"builder-3dde0bf6c8544e5e9ab41b18a9d68034",{"name":322,"tag":322,"options":1055,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":1056,"description":1057,"image":1058,"reverse":6},"\u003Ch2>Use your browser to curb Saas Sprawl\u003C/h2>","\u003Cp>Shadow SaaS isn’t hiding in your network, it’s in your browser. From AI tools to unsanctioned file-sharing sites, security risks live in the apps your users sign into every day. Push maps your organization's true SaaS footprint in real time, exposing apps and accounts with unmanaged access, poor authentication, or no security oversight.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cbr>\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb6811a214c7949b6bbe0b9a3bca62efd",{"large":1060},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1062,"meta":1063,"component":1064,"responsiveStyles":1069},"builder-e2420451ccdc4f088d0a4904cff45935",{"previousId":942},{"name":336,"options":1065,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":1066,"description":1067,"reverse":34,"image":1068},"\u003Ch2>Discover hidden SaaS usage\u003C/h2>","\u003Cp>Push captures live browser telemetry across every tab and session. Whether a user signs into a sanctioned app with a personal account or tries a new AI plugin, you’ll see it in real time, with no integrations or manual tagging.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe16e301f9af94665b95d98232a863d8a",{"large":1070},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":347,"marginTop":347},{"@type":47,"@version":48,"id":1072,"meta":1073,"component":1074,"responsiveStyles":1079},"builder-b36de7fce7994beea9e58d94662e7166",{"previousId":952},{"name":336,"options":1075,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":1076,"description":1077,"reverse":6,"image":1078},"\u003Ch2>Spot risky access and unsafe usage\u003C/h2>","\u003Cp>Discovery is just the beginning. Push flags apps with risky traits, no MFA, no SSO, known vulnerabilities, or broad access scopes. You’ll know which tools introduce real risk, and which users are exposed so you can act with precision.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6585f3c242da4d70ae3cb7d02f481bef",{"large":1080},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":1082,"meta":1083,"component":1084,"responsiveStyles":1089},"builder-dc366b5134684fe7a508edf8913103ea",{"previousId":962},{"name":336,"options":1085,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":1086,"description":1087,"reverse":34,"image":1088},"\u003Ch2>Close gaps before they grow\u003C/h2>","\u003Cp>Push turns insight into action. When risky SaaS use is detected, guide users to enable MFA, block high-risk apps, or apply in-browser guardrails automatically. All without deploying new infrastructure or managing dozens of integrations.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe6d60b6d91414819bc6258a318f00557",{"large":1090},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":1092,"meta":1093,"component":1094,"responsiveStyles":1096},"builder-8708f6f0d8da4b3f9e17bf16cda70219",{"previousId":972},{"name":317,"options":1095,"isRSC":61},{"darkMode":6},{"large":1097},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1099,"component":1100,"responsiveStyles":1102},"builder-8ff4b38d60534cf28cb523ab0f754875",{"name":379,"tag":379,"options":1101,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":1103},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":1105,"@type":47,"tagName":74,"properties":1106,"responsiveStyles":1107},"builder-pixel-c9mgiccbyis",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":1108},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":1110},{"path":29,"query":1111},{},{},1770892936802,1746714967208,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F01bfb2304521412fbd2e1a1180904d40",[],{"originalContentId":882,"winningTest":61,"lastPreviewUrl":1118,"breakpoints":1119,"kind":401,"hasLinks":6,"hasAutosaves":6},"https://pushsecurity.com/uc/shadow-saas?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=5f118e24433d46ceb79f5099987156d7&builder.overrides.5f118e24433d46ceb79f5099987156d7=5f118e24433d46ceb79f5099987156d7&builder.overrides.use-case-page:/uc/shadow-saas=5f118e24433d46ceb79f5099987156d7&builder.options.includeRefs=true&builder.options.enrich=true&builder.options.locale=Default",{"xsmall":31,"small":32,"medium":33},{"createdDate":1121,"id":1122,"name":1123,"modelId":224,"published":13,"stageModifiedSincePublish":6,"query":1124,"data":1127,"variations":1233,"lastUpdated":1234,"firstPublished":1235,"testRatio":23,"screenshot":1236,"createdBy":91,"lastUpdatedBy":396,"folders":1237,"meta":1238,"rev":403},1764707470172,"b62629ce2f3741158d961cd10fe74b31","Shadow AI",[1125],{"@type":227,"property":228,"operator":229,"value":1126},"/uc/shadow-ai",{"fontAwesomeIcon":1128,"jsCode":29,"tsCode":29,"seoTitle":1129,"title":1130,"customFonts":1131,"seoDescription":1136,"blocks":1137,"url":1126,"state":1230},"faBrainCircuit","Secure AI native and AI enhanced apps. ","Secure AI",[1132],{"family":235,"subsets":1133,"category":258,"files":1134,"variants":1135,"kind":236,"lastModified":238,"menu":259,"version":237},[261,262],{"100":240,"200":241,"300":242,"500":243,"600":244,"700":245,"800":246,"900":247,"800italic":248,"100italic":251,"600italic":257,"italic":252,"700italic":250,"200italic":254,"regular":253,"900italic":249,"300italic":256,"500italic":255},[264,265,266,267,268,269,71,270,271,272,273,274,275,276,277,278,279,280],"See and control AI apps in the browser.",[1138,1225],{"@type":47,"@version":48,"tagName":286,"id":1139,"meta":1140,"children":1141},"builder-a6e5717a2c914d5695058e4ee201a05d",{"previousId":1019},[1142,1158,1165,1172,1182,1192,1202,1212,1219],{"@type":47,"@version":48,"id":1143,"meta":1144,"component":1145,"responsiveStyles":1156},"builder-3e0ed678683f4a0eb7aa00253cf263b2",{"previousId":1023},{"name":290,"options":1146,"isRSC":61},{"title":1130,"description":1147,"points":1148,"image":1155},"\u003Cp>Every AI interaction traverses the browser. Employees use GenAI tools, connect AI apps to corporate accounts, and run agentic workflows, often outside security oversight. Push gives security teams the visibility to see what AI is doing across their environment and the controls to intervene before sensitive data leaves or access gets abused.\u003C/p>",[1149,1151,1153],{"item":1150},"Discover every AI tool and agent active across your workforce",{"item":1152},"Detect sensitive data being submitted to AI apps",{"item":1154},"Enforce AI policy directly in the browser","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F33cf153d920f4e389f3650253577cff7",{"large":1157},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":305},{"@type":47,"@version":48,"id":1159,"meta":1160,"component":1161,"responsiveStyles":1163},"builder-76968f8471d14893b8189d75b08fb426",{"previousId":1039},{"name":309,"options":1162,"isRSC":61},{"AllPartners":34,"backgroundTransparent":6},{"large":1164},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"backgroundColor":313},{"@type":47,"@version":48,"id":1166,"meta":1167,"component":1168,"responsiveStyles":1170},"builder-b55b9d4bc5a649d8839ce7f6c2043d95",{"previousId":1046},{"name":317,"options":1169,"isRSC":61},{"darkMode":34},{"large":1171},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1173,"meta":1174,"component":1175,"responsiveStyles":1180},"builder-c3f38ef4d75d4989a29b5903175ed8a1",{"previousId":1053},{"name":322,"tag":322,"options":1176,"isRSC":61},{"darkMode":6,"maxWidth":326,"maxTextWidth":327,"title":1177,"description":1178,"image":1179,"reverse":6},"\u003Ch2>The browser is where AI lives\u003C/h2>","\u003Cp>AI activity doesn't happen at the network layer or the endpoint. It happens in the browser, where employees interact with AI tools, where agents execute tasks, and where sensitive data gets submitted to external services. Push captures live telemetry from inside the browser session, identifying every AI-native and AI-enhanced application in use. \u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F30b43bda6f1644c19478fb1efa20050c",{"large":1181},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1183,"meta":1184,"component":1185,"responsiveStyles":1190},"builder-90ee9cb9afc44e7f885523715bf51a53",{"previousId":1062},{"name":336,"options":1186,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":339,"title":1187,"description":1188,"reverse":34,"image":1189},"\u003Ch2>Discover every AI tool users touch\u003C/h2>","\u003Cp>Most organisations are using far more AI than they've approved. Push identifies every AI-native and AI-enhanced application accessed across the workforce, which corporate identities are connected, and what new tools appear in the environment. Applications are categorized by risk and policy status so security teams can prioritize exposure before it becomes an incident.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F636e65ad0c4c43faa3e626c41e90d8a3",{"large":1191},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"fontFamily":345,"paddingTop":347,"marginTop":347},{"@type":47,"@version":48,"id":1193,"meta":1194,"component":1195,"responsiveStyles":1200},"builder-9e44539fa53c4d8e87406036c921fc46",{"previousId":1072},{"name":336,"options":1196,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":352,"title":1197,"description":1198,"reverse":6,"image":1199},"\u003Ch2>Prevent sensitive data from reaching the wrong AI tools\u003C/h2>","\u003Cp>Employees paste credentials, customer data, and internal documents into AI tools without realizsing the risk. Push detects sensitive data interactions in the browser in real time, including file uploads, clipboard activity, and form submissions to unsanctioned or high-risk AI applications. Controls can be applied to warn users, require policy acknowledgment, or block the interaction entirely.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F011332d42dab4a299f25ab3847741ed9",{"large":1201},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":358},{"@type":47,"@version":48,"layerName":336,"id":1203,"meta":1204,"component":1205,"responsiveStyles":1210},"builder-44c1a891926f4bdeaaa37e90721fe6ac",{"previousId":1082},{"name":336,"options":1206,"isRSC":61},{"darkMode":6,"maxWidth":326,"imageMaxWidth":338,"textPaddingTop":363,"title":1207,"description":1208,"reverse":34,"image":1209},"\u003Ch2>Govern agentic AI permissions and activity\u003C/h2>","\u003Cp>AI agents operating in the browser can access applications, execute actions, and handle data on behalf of users, often with permissions that were never explicitly reviewed. Push surfaces agentic permissions and data flows so security teams can see what agents are doing, where they have access, and apply controls before that access is exploited or abused.\u003C/p>","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F71549a73d0b84f1c8cb151c05e493e8d",{"large":1211},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":369},{"@type":47,"@version":48,"id":1213,"meta":1214,"component":1215,"responsiveStyles":1217},"builder-dcc906f9cbe54dc68b3c672668e7a38f",{"previousId":1092},{"name":317,"options":1216,"isRSC":61},{"darkMode":6},{"large":1218},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"@type":47,"@version":48,"id":1220,"component":1221,"responsiveStyles":1223},"builder-d2d64780c31b4349bc75805b23a07e38",{"name":379,"tag":379,"options":1222,"isRSC":61},{"sectionHeading":29,"customClass":381},{"large":1224},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},{"id":1226,"@type":47,"tagName":74,"properties":1227,"responsiveStyles":1228},"builder-pixel-t14340mredm",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":1229},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":1231},{"path":29,"query":1232},{},{},1776875934687,1764950077593,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6ce1c8d6242349f8b66cb3afa7885651",[],{"hasLinks":6,"winningTest":61,"originalContentId":1002,"kind":401,"breakpoints":1239,"lastPreviewUrl":1240,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"https://pushsecurity.com/uc/shadow-ai?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CcreateProjects%2CsendPullRequests&builder.user.role.name=Designer&builder.user.role.id=creator&builder.cachebust=true&builder.preview=use-case-page&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.use-case-page=b62629ce2f3741158d961cd10fe74b31&builder.overrides.b62629ce2f3741158d961cd10fe74b31=b62629ce2f3741158d961cd10fe74b31&builder.overrides.use-case-page:/uc/shadow-ai=b62629ce2f3741158d961cd10fe74b31&builder.options.locale=Default",{"w":1242,"h":1243,"d":1244},448,512,"M280.4 48c-3.2 0-6.3 .5-9.3 1.4L206.6 69.2C136.1 90.9 88 156.1 88 229.8l0 42.9c22.7 3.8 40 23.6 40 47.3l0 144c0 26.5-21.5 48-48 48l-32 0c-26.5 0-48-21.5-48-48L0 320c0-23.8 17.3-43.5 40-47.3l0-42.9C40 135 101.8 51.2 192.5 23.4L256.9 3.5c7.6-2.3 15.5-3.5 23.4-3.5 44 0 79.6 35.7 79.6 79.6l0 56.4c0 13.3-10.7 24-24 24s-24-10.7-24-24l0-56.4C312 62.2 297.8 48 280.4 48zM48 320l0 144 32 0 0-144-32 0zm208 24c0-71.6 55.6-127.8 89-148.1 4.3-2.6 9.6-2.6 14 0 33.5 20.3 89 76.6 89 148.1 0 32-16 80-64 112l27.3 27.3c3 3 4.7 7.1 4.7 11.3l0 1.4c0 8.8-7.2 16-16 16l-96 0c-8.8 0-16-7.2-16-16l0-1.4c0-4.2 1.7-8.3 4.7-11.3L320 456c-48-32-64-80-64-112zm128-32a24 24 0 1 0 -48 0 24 24 0 1 0 48 0z",{"w":1243,"h":1243,"d":1246},"M201.1 57.3c-7 5.3-9.1 10.7-9.1 14.7 0 4.2 2.4 10.1 10.4 15.6 7.8 5.3 13.6 14.6 13.6 25.6 0 17-13.8 30.7-30.7 30.7L56 144c-4.4 0-8 3.6-8 8l0 52.5c7.4-2.9 15.5-4.5 24-4.5 43.1 0 72 39.4 72 80s-28.9 80-72 80c-8.5 0-16.6-1.6-24-4.5L48 456c0 4.4 3.6 8 8 8l100.5 0c-2.9-7.4-4.5-15.5-4.5-24 0-43.1 39.4-72 80-72s80 28.9 80 72c0 8.5-1.6 16.6-4.5 24l52.5 0c4.4 0 8-3.6 8-8l0-129.3c0-17 13.8-30.7 30.7-30.7 11.1 0 20.3 5.8 25.6 13.6 5.5 8 11.4 10.4 15.6 10.4 4 0 9.5-2.1 14.7-9.1s9.3-17.9 9.3-30.9-4-23.8-9.3-30.9-10.7-9.1-14.7-9.1c-4.2 0-10.1 2.4-15.6 10.4-5.3 7.8-14.6 13.6-25.6 13.6-17 0-30.7-13.8-30.7-30.7l0-81.3c0-4.4-3.6-8-8-8l-81.3 0c-17 0-30.7-13.8-30.7-30.7 0-11.1 5.8-20.3 13.6-25.6 8-5.5 10.4-11.4 10.4-15.6 0-4-2.1-9.5-9.1-14.7S245 48 232 48 208.2 52 201.1 57.3zM172.3 18.9C188.5 6.8 209.6 0 232 0S275.5 6.8 291.7 18.9 320 49.5 320 72c0 8.6-1.8 16.7-4.9 24L360 96c30.9 0 56 25.1 56 56l0 44.9c7.3-3.1 15.4-4.9 24-4.9 22.5 0 41 12.2 53.1 28.3s18.9 37.3 18.9 59.7-6.8 43.5-18.9 59.7-30.6 28.3-53.1 28.3c-8.6 0-16.7-1.8-24-4.9l0 92.9c0 30.9-25.1 56-56 56l-78.1 0c-18.7 0-33.9-15.2-33.9-33.9 0-10.1 4.5-18.5 9.9-24.2 4.2-4.3 6.1-9.2 6.1-13.9 0-9.9-10.7-24-32-24s-32 14.1-32 24c0 4.7 1.9 9.5 6.1 13.9 5.5 5.7 9.9 14.1 9.9 24.2 0 18.7-15.2 33.9-33.9 33.9L56 512c-30.9 0-56-25.1-56-56L0 329.9c0-18.7 15.2-33.9 33.9-33.9 10.1 0 18.5 4.5 24.2 9.9 4.3 4.2 9.2 6.1 13.9 6.1 9.9 0 24-10.7 24-32s-14.1-32-24-32c-4.7 0-9.5 1.9-13.9 6.1-5.7 5.5-14.1 9.9-24.2 9.9-18.7 0-33.9-15.2-33.9-33.9L0 152c0-30.9 25.1-56 56-56l92.9 0c-3.1-7.3-4.9-15.4-4.9-24 0-22.5 12.2-41 28.3-53.1z",{"w":1242,"h":1243,"d":1248},"M102.7 96c10.4-53.7 31.9-112 68.3-112 9.6 0 19 3.9 27.5 8.2 8.2 4.1 18.4 7.8 25.5 7.8s17.3-3.7 25.5-7.8c8.5-4.3 17.9-8.2 27.5-8.2 36.4 0 57.8 58.3 68.3 112L376 96c13.3 0 24 10.7 24 24s-10.7 24-24 24l-24 0 0 32c0 17-3.3 33.2-9.3 48l33.3 0c8.1 0 15.6 4 20 10.8s5.2 15.2 2.1 22.6l-31.5 74.2c48.9 31.2 81.4 86 81.4 148.5l0 8c0 13.3-10.7 24-24 24s-24-10.7-24-24l0-8c0-51.4-30.3-95.8-74.1-116.1-11.7-5.5-17-19.2-12-31.2l25.8-60.7-27.7 0c-1.1 0-2.1-.1-3.1-.2-22.6 20-52.3 32.2-84.9 32.2s-62.3-12.2-84.9-32.2c-1 .1-2.1 .2-3.1 .2l-27.7 0 25.8 60.7c5.1 11.9-.2 25.7-12 31.2-43.8 20.4-74.1 64.7-74.1 116.1l0 8c0 13.3-10.7 24-24 24S0 501.3 0 488l0-8c0-62.4 32.5-117.2 81.4-148.5L49.9 257.4c-3.2-7.4-2.4-15.9 2.1-22.6S63.9 224 72 224l33.3 0c-6-14.8-9.3-31-9.3-48l0-32-24 0c-13.3 0-24-10.7-24-24S58.7 96 72 96l30.7 0zm45.9 107c11.1 30.9 40.6 53 75.3 53s64.2-22.1 75.3-53c-5.7 3.2-12.3 5-19.3 5l-12.4 0c-16.5 0-31.1-10.6-36.3-26.2-2.3-7-12.2-7-14.5 0-5.2 15.6-19.9 26.2-36.3 26.2L168 208c-7 0-13.6-1.8-19.3-5zm44.8 133l61 0c9.7 0 17.5 7.8 17.5 17.5 0 4.2-1.5 8.2-4.2 11.4l-27.9 32.5 28.9 82.6c5.5 15.6-6.1 31.9-22.7 31.9l-44.3 0c-16.5 0-28.1-16.3-22.7-31.9l28.9-82.6-27.9-32.5c-2.7-3.2-4.2-7.2-4.2-11.4 0-9.7 7.8-17.5 17.5-17.5z",{"w":1243,"h":1243,"d":1250},"M304.8 173.3c-14.3-8.4-31-13.3-48.8-13.3-53 0-96 43-96 96s43 96 96 96 96-43 96-96l48 0c0 79.5-64.5 144-144 144s-144-64.5-144-144 64.5-144 144-144c31.1 0 59.9 9.9 83.4 26.6l45.7-45.7C349.7 64.8 304.8 48 256 48 141.1 48 48 141.1 48 256s93.1 208 208 208 208-93.1 208-208l48 0c0 141.4-114.6 256-256 256S0 397.4 0 256 114.6 0 256 0c62.1 0 118.9 22.1 163.3 58.8L463 15c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9L273 273c-9.4 9.4-24.6 9.4-33.9 0s-9.4-24.6 0-33.9l65.7-65.7z",{"w":32,"h":1243,"d":1252},"M128 80l384 0c8.8 0 16 7.2 16 16l0 208 48 0 0-208c0-35.3-28.7-64-64-64L128 32C92.7 32 64 60.7 64 96l0 208 48 0 0-208c0-8.8 7.2-16 16-16zM52.8 400l534.4 0c-8.5 18.9-27.5 32-49.6 32l-435.2 0c-22.1 0-41.1-13.1-49.6-32zM25.6 352C11.5 352 0 363.5 0 377.6 0 434.2 45.8 480 102.4 480l435.2 0c56.6 0 102.4-45.8 102.4-102.4 0-14.1-11.5-25.6-25.6-25.6L25.6 352zM281 169c9.4-9.4 9.4-24.6 0-33.9s-24.6-9.4-33.9 0l-48 48c-9.4 9.4-9.4 24.6 0 33.9l48 48c9.4 9.4 24.6 9.4 33.9 0s9.4-24.6 0-33.9l-31-31 31-31zM393 135c-9.4-9.4-24.6-9.4-33.9 0s-9.4 24.6 0 33.9l31 31-31 31c-9.4 9.4-9.4 24.6 0 33.9s24.6 9.4 33.9 0l48-48c9.4-9.4 9.4-24.6 0-33.9l-48-48z",{"w":1243,"h":1243,"d":1254},"M232 0c-13.3 0-24 10.7-24 24s10.7 24 24 24c128.1 0 232 103.9 232 232 0 13.3 10.7 24 24 24s24-10.7 24-24C512 125.4 386.6 0 232 0zM48 256c0-23 3.7-45 10.5-65.6l263 263C301 460.3 279 464 256 464 141.1 464 48 370.9 48 256zM72.8 136.8c-14.1-14.1-37.6-12-46.5 5.8-16.9 34.2-26.4 72.6-26.4 113.3 0 141.4 114.6 256 256 256 40.7 0 79.2-9.5 113.3-26.4 17.9-8.8 19.9-32.4 5.8-46.5L241 305 281 265c9.4-9.4 9.4-24.6 0-33.9s-24.6-9.4-33.9 0L207 271 72.8 136.8zM208 120c0 13.3 10.7 24 24 24 75.1 0 136 60.9 136 136 0 13.3 10.7 24 24 24s24-10.7 24-24c0-101.6-82.4-184-184-184-13.3 0-24 10.7-24 24z",{"w":1243,"h":1243,"d":1256},"M256.1 0c4.6 0 9.2 1 13.3 2.9L457.8 82.8c22 9.3 38.4 31 38.3 57.2-.5 99.2-41.3 280.7-213.6 363.2-16.7 8-36.1 8-52.8 0-172.4-82.5-213.2-263.9-213.7-363.2-.1-26.2 16.3-47.9 38.3-57.2L242.7 2.9C246.8 1 251.4 0 256.1 0zM73.1 127c-5.9 2.5-9.1 7.7-9 12.7 .5 91.4 38.4 249.3 186.4 320.1 3.6 1.7 7.8 1.7 11.3 0 148-70.8 185.9-228.7 186.3-320.1 0-5-3.1-10.2-9-12.7l-183-77.6-183 77.6zm240.3 34.9c7.8-10.7 22.8-13.1 33.5-5.3 10.7 7.8 13.1 22.8 5.3 33.5L249.8 330.9c-4.2 5.7-10.7 9.3-17.8 9.8s-14-2.2-18.9-7.3l-46.4-48c-9.2-9.5-9-24.7 .6-33.9 9.5-9.2 24.7-8.9 33.9 .6l26.5 27.4 85.6-117.7z",{"w":1243,"h":1243,"d":1258},"M123 58.1c9.5-33.5 40.4-58.1 77-58.1 21.8 0 41.6 8.7 56 22.9 14.4-14.1 34.2-22.9 56-22.9 36.6 0 67.4 24.6 77 58.1 47.4 9.7 83 51.6 83 101.9 0 11.3-1.8 22.2-5.1 32.3 22.7 19.1 37.1 47.7 37.1 79.7 0 23.7-8 45.6-21.3 63.1 3.5 10.4 5.3 21.4 5.3 32.9 0 54-41.2 98.5-93.9 103.5-15.6 24.3-42.9 40.5-74.1 40.5-25.2 0-48-10.6-64-27.6-16 17-38.8 27.6-64 27.6-31.1 0-58.4-16.2-74.1-40.5-52.7-5.1-93.9-49.5-93.9-103.5 0-11.5 1.9-22.5 5.3-32.9-13.4-17.5-21.3-39.4-21.3-63.1 0-32 14.5-60.6 37.1-79.7-3.3-10.2-5.1-21.1-5.1-32.3 0-50.3 35.6-92.2 83-101.9zM200 48c-17.7 0-32 14.3-32 32 0 13.3-10.7 24-24 24-30.9 0-56 25.1-56 56 0 10.5 2.9 20.3 7.9 28.6 3.4 5.7 4.3 12.5 2.5 18.9s-6.2 11.7-12 14.7c-18 9.3-30.3 28.1-30.3 49.8 0 16.1 6.8 30.7 17.8 40.9 7.9 7.4 9.9 19.2 4.8 28.8-4.2 7.8-6.5 16.7-6.5 26.3 0 30.9 25.1 56 56 56 1.1 0 2.2 0 3.2-.1 10.3-.6 19.8 5.5 23.6 15 5.9 14.7 20.4 25.1 37.1 25.1 20.4 0 37.2-15.3 39.7-35 .1-.6 .2-1.3 .3-1.9l0-135.1-40 0c-6.6 0-12 5.4-12 12l0 4.4c16.5 7.6 28 24.3 28 43.6 0 26.5-21.5 48-48 48s-48-21.5-48-48c0-19.4 11.5-36.1 28-43.6l0-4.4c0-28.7 23.3-52 52-52l40 0 0-56-12.4 0c-7.6 16.5-24.3 28-43.6 28-26.5 0-48-21.5-48-48s21.5-48 48-48c19.4 0 36.1 11.5 43.6 28l12.4 0 0-76c0-17.7-14.3-32-32-32zm80 148l0 152 40 0c6.6 0 12-5.4 12-12l0-4.4c-16.5-7.6-28-24.3-28-43.6 0-26.5 21.5-48 48-48s48 21.5 48 48c0 19.4-11.5 36.1-28 43.6l0 4.4c0 28.7-23.3 52-52 52l-40 0 0 39.1c.1 .6 .2 1.2 .3 1.9 2.5 19.7 19.3 35 39.7 35 16.8 0 31.2-10.3 37.1-25.1 3.8-9.6 13.3-15.6 23.6-15 1.1 .1 2.2 .1 3.2 .1 30.9 0 56-25.1 56-56 0-9.5-2.4-18.5-6.5-26.3-5.1-9.6-3.1-21.4 4.8-28.8 11-10.2 17.8-24.8 17.8-40.9 0-21.6-12.2-40.4-30.3-49.8-5.9-3-10.2-8.4-12-14.7s-.9-13.2 2.5-18.9c5-8.4 7.9-18.1 7.9-28.6 0-30.9-25.1-56-56-56-13.3 0-24-10.7-24-24 0-17.7-14.3-32-32-32s-32 14.3-32 32l0 76 12.4 0c7.6-16.5 24.3-28 43.6-28 26.5 0 48 21.5 48 48s-21.5 48-48 48c-19.4 0-36.1-11.5-43.6-28L280 196zm56-36a16 16 0 1 0 0 32 16 16 0 1 0 0-32zm0 128a16 16 0 1 0 32 0 16 16 0 1 0 -32 0zM144 352a16 16 0 1 0 32 0 16 16 0 1 0 -32 0zm16-176a16 16 0 1 0 32 0 16 16 0 1 0 -32 0z",{"createdDate":1260,"id":1261,"name":1262,"modelId":1263,"published":13,"stageModifiedSincePublish":6,"query":1264,"data":1267,"variations":1561,"lastUpdated":1562,"firstPublished":1563,"testRatio":23,"screenshot":1564,"createdBy":91,"lastUpdatedBy":92,"folders":1565,"meta":1566,"rev":1570},1777381543217,"81aa98f35767473898a201b6494d3cda","On-demand webinar: Yes, You've Been Pwned","e9fdeafccfb84c88b96f694861f88e3f",[1265],{"@type":227,"property":228,"operator":229,"value":1266},"/resources/yes-youve-been-pwned",{"seoDescription":1268,"title":1269,"inputs":1270,"private":6,"description":1271,"themeId":6,"seoTitle":1269,"type":1272,"coverImage":1273,"blocks":1274,"url":1266,"state":1555},"Join Troy Hunt and Mark Orlando for a deep dive into weak passwords and data breaches.","On-demand Webinar: Yes, You've Been Pwned",[],"Join Troy Hunt and Mark Orlando for a deep dive into weak, breached, and reused passwords","Webinar","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F43bbba4db1fc492aa1f3e64d1a74bcae",[1275,1439,1522,1533,1550],{"@type":47,"@version":48,"id":1276,"meta":1277,"component":1279,"responsiveStyles":1433},"builder-989bcb32230d4663b401271e6fd13ad3",{"previousId":1278},"builder-6a9d8b05d90c48caa49a5fd54433e31f",{"name":1280,"options":1281,"isRSC":61},"Columns",{"columns":1282,"space":1431,"stackColumnsAt":1432,"reverseColumnsWhenStacked":6},[1283],{"blocks":1284},[1285,1300,1314,1322,1374,1384,1396,1409,1423],{"@type":47,"@version":48,"id":1286,"component":1287,"responsiveStyles":1291},"builder-9902df7f9f6042efbcd0ea0fd3a51efe",{"name":1288,"options":1289,"isRSC":61},"Text",{"text":1290},"\u003Cp>\u003Cstrong style=\"color: rgb(208, 2, 27);\">Webinar Series - On Demand\u003C/strong>\u003C/p>",{"large":1292},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"lineHeight":1293,"height":1294,"marginLeft":1294,"marginRight":1294,"borderWidth":1295,"borderStyle":1296,"borderColor":1297,"paddingLeft":1298,"paddingRight":1298,"paddingTop":1299,"paddingBottom":1299,"borderRadius":346,"overflow":82,"marginBottom":1298,"fontSize":1298},"normal","auto","1px","solid","#C14424","1rem",".5rem",{"@type":47,"@version":48,"id":1301,"meta":1302,"component":1304,"responsiveStyles":1308},"builder-c2f7eb0f759342a4ad078c8bec75ff00",{"previousId":1303},"builder-e9a1fb1c2fd44bd7894bd280dabe34d1",{"name":1305,"tag":1305,"options":1306,"isRSC":61},"PageTitle",{"title":1307,"isCentered":34},"\u003Ch1>State of \u003Cstrong>Browser Attacks\u003C/strong> Series: \u003C/h1>\u003Ch1>Yes, You've Been Pwned\u003C/h1>",{"large":1309,"small":1313},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"marginTop":347,"marginBottom":1310,"textAlign":1311,"paddingLeft":347,"paddingBottom":1312,"marginLeft":1294,"marginRight":1294},"-20px","center","px",{"paddingLeft":347},{"@type":47,"@version":48,"id":1315,"component":1316,"responsiveStyles":1319},"builder-40050246ea2e4f968aed35a82a072181",{"name":1288,"options":1317,"isRSC":61},{"text":1318},"\u003Cp>Learn how attackers exploit weak, breached, and reused passwords — and what you can do about it.\u003C/p>",{"large":1320},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"lineHeight":1293,"height":1294,"color":1321,"marginLeft":1294,"marginRight":1294},"#CCD1E0",{"@type":47,"@version":48,"id":1323,"component":1324,"responsiveStyles":1369},"builder-96f5292568664bdd8f0e0fd3e2114f2d",{"name":1325,"options":1326,"isRSC":61},"Spotlight",{"hosts":1327},[1328,1350],{"host":1329},{"@type":111,"id":1330,"model":1331,"value":1332},"809e6061972e4a98a75cf92d6add3dba","push-employees",{"createdDate":1333,"id":1330,"name":1334,"modelId":1335,"published":13,"meta":1336,"query":1338,"data":1339,"variations":1344,"lastUpdated":1345,"firstPublished":1346,"testRatio":23,"createdBy":1347,"lastUpdatedBy":25,"folders":1348,"rev":1349},1760040421522,"Mark Orlando","48dc72336f734204a27e16b4c76b6b76",{"breakpoints":1337,"kind":28,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"name":1340,"avatar":1341,"surname":1342,"jobtitle":1343},"Mark","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F9a9d1e52bba74c16b2c9dc9b378da80d","Orlando","Field CTO",{},1761303548398,1760040468859,"Vcs09PUqI9PcLtzXOEgfTn5t6n42",[],"zkudqoeo7t",{"host":1351},{"@type":111,"id":1352,"model":1331,"value":1353},"e0e3f317cb0346d7b38b44ca36c8b8b9",{"createdDate":1354,"id":1352,"name":1355,"modelId":1335,"published":13,"stageModifiedSincePublish":6,"query":1356,"data":1357,"variations":1362,"lastUpdated":1363,"firstPublished":1364,"testRatio":23,"createdBy":92,"lastUpdatedBy":92,"folders":1365,"meta":1366,"rev":1368},1777382835527,"Troy Hunt-Creator of Have I Been Pwned",[],{"name":1358,"surname":1359,"jobtitle":1360,"avatar":1361},"Troy","Hunt","Creator of Have I Been Pwned","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6029cba39d8e4aff9f64204c7f836ec7",{},1777382910702,1777382910695,[],{"breakpoints":1367,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"nj4ulnmr1js",{"large":1370,"small":1373},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingLeft":1371,"paddingTop":347,"marginTop":1372,"marginLeft":1294,"marginRight":1294},"15px","10px",{"display":83},{"@type":47,"@version":48,"id":1375,"meta":1376,"component":1378,"responsiveStyles":1382},"builder-5e890318fab24ba79607e456522ba9b9",{"previousId":1377},"builder-4ab2e774a42143f4aa2f56a38e558698",{"name":1379,"options":1380,"isRSC":61},"youtube",{"videoId":1381},"mplJUDB5un4",{"large":1383},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingLeft":347,"paddingRight":347,"marginTop":347,"marginLeft":347,"marginRight":347},{"@type":47,"@version":48,"id":1385,"meta":1386,"component":1388,"responsiveStyles":1391},"builder-5b5afc88be49401fbe4e69c4fede0e85",{"previousId":1387},"builder-a21da64ac306462c8dc0b908f92fa1c7",{"name":1288,"options":1389,"isRSC":61},{"text":1390},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Got questions for John or Luke?\u003C/span>\u003C/p>",{"large":1392,"medium":1394,"small":1395},{"display":83,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"lineHeight":1393,"height":1294,"fontSize":70,"paddingLeft":1371,"paddingBottom":1371,"textAlign":1311,"paddingTop":1371},"32px",{"display":83},{"display":83},{"@type":47,"@version":48,"id":1397,"meta":1398,"component":1400,"responsiveStyles":1407},"builder-ce66beac19da4f9b9a42565ce097cbde",{"previousId":1399},"builder-7670bb34f6094786a3a6b22acf22b5e0",{"name":1401,"options":1402,"isRSC":61},"Accordian",{"options":1403},[1404],{"optionTitle":1405,"description":1406},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Transcript:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Yes, You've Been Pwned\u003C/span>\u003C/p>","\u003Cp>\u003Cstrong>Mark:\u003C/strong> Well, welcome everyone to the second in Push Security's series on the state of browser attacks. I'm Mark Orlando, Field CTO at Push, and for this session I'm joined by someone who probably needs no introduction, but I'm going to do it anyway. He's a Microsoft Regional Director and MVP, speaker, trainer, founder, and CEO of Have I Been Pwned — Troy Hunt. Welcome. Thanks for joining me.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Hey Mark. Thanks for having me.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Absolutely. Lots of ground to cover today. Really excited to kind of hear your insights on some of these problems and some of the work that you've been doing now for — over a decade, right? Coming up on 13 years?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, half a million — wild, isn't it? I have children that are only that age. It's a long time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Um, good. Well, I wanted to kind of start off with a broad question. You know, you've collected — I think more of this data, this credential breach data, arguably than anyone in history. I would say at this point — I think I saw you're into billions of email addresses now, the dataset obviously quite large — and if you had to summarize, over these 13 years or so, what your work has taught you about why these things are still happening, why these kinds of breaches are still happening, why these attacks still work — what would you say?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, it's a fascinating question and I think there are many different reasons for it. Part of the question about \"why\" is what motivates attackers — what makes attackers go after this data? Some of the classic motives are things like money. Obviously people are seeking it for money. I do feel like we've seen a shift in recent times where we are seeing a lot more data breaches and \"pay or leak\" style scams, where people are grabbing data and then trying to shake the company down for money. I'm sure we'll go more into that shortly as well.\u003C/p>\u003Cp>There's the old sort of curiosity and adventure as well. A lot of the data breaches we have are from kids, usually. Legally kids, or — yeah, kids in that they're a lot younger than us — but it's almost always someone very young who just has this curiosity, and they probe and they prod, and they eventually find a way in and pull data out. I don't think any of those motives are changing. All that's really happened over time is the emergence of ubiquitous cloud computing, where it's easier than ever to spin stuff up. Now of course with AI — I don't think we're necessarily making more mistakes because of AI, but it's that much easier to create more things that create bigger footprints. We've just got more systems online and more people looking at them. So I just can't see any reason why this would slow down at all. I've been saying this for a very long time, and here we are with things definitely accelerating.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Yeah, it's interesting. And I'm kind of wondering at this point — you've been doing this for quite some time. I've been in cyber defense for coming up on a couple of decades now, and it seems to me that, as you said, this stuff isn't really slowing down. And I guess I'm wondering at this point, from your perspective: do you see this as an inflection point at all? Are we seeing a huge spike? Is this just continuing to trend in the direction it has been for quite some time? What are your thoughts?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Look, it depends on how you measure it, but I honestly can't think of an empirical measurement that would show that we've suddenly hit some inflection point where things are going through the roof. I do think we have phases where particularly certain threat actors or certain exploits gain prominence. At the moment — at the time of recording — it's the Shiny Hunters, who are very good at social engineering via voice phishing and getting into Salesforce instances. We're seeing a lot of stuff dumped by that mechanism. But organizations will get better at securing that, Salesforce will probably have more secure-by-default profiles, these guys will get arrested, and then we'll move on and there'll be something else. But I think it's just one continuous growth if you look at it over a longer period of time.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Do you think that — it seems like with this credential theft ecosystem, and the commoditization happening here — and I'm thinking more about the attack infrastructure and some of these kits and rentable infrastructure that can be had for, in some cases, a few hundred bucks. You get like 10 days of access, or maybe a one-time fee for permanent access. From our side at Push, we're seeing that this has kind of a flywheel effect. And you see this especially with attacks like ClickFix, which you can launch with some of this rentable infrastructure — where it's like ClickFix to info stealer to account takeover, which results in maybe more ad account takeover, so you distribute more ClickFix, and it just has this compounding effect. Are you seeing that as well in some of these credential breaches, or is this just kind of another iteration of things we've seen before — just the latest pivot?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> I think the thing you touched on there — and to use a bit of an overloaded term — there's almost like the democratization of hacking tools. When you get all of these things as a service... it used to be like DDoS as a service. People would sell stressors and botnets and all this sort of thing, and in more recent times we've seen things like phishing as a service. So you don't need to be particularly technically sophisticated if you can go and pay someone else for access to their infrastructure. Of course, we've seen a lot of ransomware as a service. We've seen all sorts of turnkey platforms built by criminals for other criminals, making it so much more accessible for people with less technical skill. And maybe that's analogous to life in general in terms of access to technology. Now we've got AI that makes it so much more accessible for anybody to build an app. Before that it was platforms as a service, which made it so much easier for anyone to get access. And if you look at this through the lens of the moral neutrality of technology — that rising tide lifts all boats — and some of those boats are criminals who can now do things easier than before.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Yeah. And I wonder if that gets back to what we were saying about this sort of talent pipeline that seems to include younger and younger adversaries. I know you and I spoke about that before — this pipeline from online gaming communities and things like that into some of these nefarious groups. And I believe you've done some work or advising around that problem specifically.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, it's a really fascinating one — it's almost like the youth pipeline to cybercrime. I think it's fascinating for many reasons. The average age of people being arrested for a lot of these data breach-style activities is around 19. So — okay, adult, but just. And you started this many years ago, so you've got child hackers. It's fascinating when you look at the size of the organizations that are falling victim to children and go, \"that is just amazing leverage\" — where you've got, in some cases, Fortune 100 companies being breached by a kid in his bedroom. How are you defending a company with that much resources and money when some kid is managing to take over their systems? And the fascinating thing as well is they're not necessarily technically sophisticated. A lot of the attacks lately have been social engineering attacks. Kids are great at social engineering — if you've got kids, you know how good they are at that. And they can do that to big organizations too. It's, again, to use that term, a bit of a democratization, where everybody gets to have a shot because the bar is not necessarily that high.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Absolutely. And we're both parents — we've both seen some of the scary side of some of those skills, even if in different contexts. But I definitely think there's something there. As a defender myself, I think I took some solace in the fact that even a sophisticated attacker — maybe 15 or 20 years ago we might have said an APT, a state-sponsored attacker, or a cyber criminal actor — at the end of the day, I think when you're conceptualizing those kinds of attacks at that time, it was, \"well, there's going to be this multi-stage attack chain that's going to happen, there's going to be some logical objective at the end of that chain.\" Even if I don't observe what that is or can't necessarily infer it, most likely there's somebody on the other end who has been tasked with achieving an objective, or there's a financial incentive in play. So I think on the defensive side, we've all internalized those models and said, \"there's going to be some logic to it, some predictability — if we can just get enough visibility, if we can get enough data, if we can slam in enough security tools, we're going to be able to observe those attack chains and disrupt them.\"\u003C/p>\u003Cp>And it kind of seems like those models aren't really the same today with the types of adversaries we're talking about — this loosely affiliated comm group, Shiny Hunters, and whatever comes next in six months or a year. So I guess my question for you would be: do you think that is kind of a sea change — that we've moved from multi-stage attacks to now it's all identity, all SaaS ecosystem, and the first part of the attack — the info stealer — might not even have happened in your environment? You're just going to see the tail end of that attack chain. It seems like these attacks look somewhat different than what we designed for, even five years ago when we were building out security infrastructure. Is that what you've seen as well?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> I think what you've described is very reflective of now having a lot more external dependencies. When we think about attacks against identity, we're seeing attacks against the likes of Okta, because Okta holds identity — that's very valuable. Salesforce. A couple of years ago it was things like Snowflake, where these external dependencies have so many different entry points into them, because you've got X number of different apps that have been authorized to go in and get certain data to do their certain things. I'm very sympathetic to organizations where, if you put all of this up on a board — crime fighter style — and you draw the lines between everything, it's just an absolute spider web of interdependencies and access rights. And that's enormously difficult, because once a group manages to find a reproducible pattern to gain access to these things, the same pattern is used by so many different organizations. And again, this is why we see so many attacks of the same style against massive organizations that, at the point of recording, have been going on for a couple of months as it relates to the Shiny Hunters group. So clearly it's got legs, and it just keeps continuing.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Yeah. Well, I think that kind of covers the problem, so to speak, and I want to spend some time also talking about solutions — or maybe how security teams can start to level the playing field a little bit. And again, just from your perspective, managing all of the data that you manage — obviously there are lots of different ways that an organization or even individuals can interact with and benefit from the data you're maintaining. Can you talk about some of the ways that security teams are operationalizing the Have I Been Pwned data? Is it a direct data feed going into detection engineering pipelines? Is it more of a threat intelligence style consumption model where it's just context? What does that look like in your experience?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, it's a bit of a mix, and every now and then I find a really surprising use case someone's found as well — I'll give you an example of that in a moment. When there's a data breach, we take email addresses and put those email addresses into the online service. Nothing else goes in there, other than if we have a corpus of plain text passwords — which fortunately doesn't happen much these days. But stealer logs, credential stuffing lists, and things like this we do have in the clear. So one of the services we have is called Pwned Passwords. There are about a billion passwords from previous known data breaches in there. Everyone has a prevalence count against it. We have an API with an anonymity model where you can query it on demand or download it all. It's all open source — both code and data. And that API endpoint we see hit 18 billion times a month at the moment.\u003C/p>\u003Cp>So one really easy win here is to try and block known bad passwords. We know credential reuse is massive. We know attackers get credentials from one data breach and then go along and try them on all sorts of different services — now you've got one data breach leading to multiple account takeovers. So blocking known bad passwords is an easy win.\u003C/p>\u003Cp>Lots of organizations are also very interested in the exposure of their own people, because it turns out people reuse their passwords and also leave a lot of personal information — often on their corporate email address. So we have a domain search feature where any organization can go in and say \"show me all the email addresses at example.com\" and see which breaches they've been in, and then we'll send notifications when there are new breaches.\u003C/p>\u003Cp>Imagine an organization that discovers they have executives in the Ashley Madison data breach — that's probably going to be an HR discussion. But what if they find someone in the Dropbox data breach or whatever the next cloud-based equivalent is? Suddenly you're going, \"hang on, there are people probably behind the corporate firewall with a potentially non-sanctioned cloud storage service here — I wonder what that means for us.\" So being able to see where that organizational risk is is very useful for many companies.\u003C/p>\u003Cp>And then the example of the sorts of things we don't expect: I had a company recently who was trying to do some sort of identity verification — getting an idea of whether accounts are legitimate or have possibly just been stood up to gain access to their services. They said, \"We've got this thesis that people are so breached that if you're not in a data breach, you may not be real.\" So if they search Have I Been Pwned for an email address and it comes back with no prior breaches, that doesn't mean they're not human — it's kind of ambiguous. But conversely, if they search for someone and they're in a dozen data breaches going back the last 10 years — alright, this person has been around for a while, and it's almost certainly a legitimate email address. So that was just one of those cool use cases I hadn't thought of before.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> That's fascinating. I wouldn't have guessed that, but when you say it, it makes total sense. And there's so much in there that I want to dig into, but I think certainly this idea that your users are being issued a corporate identity — a username and password — and they're going out and self-selecting big parts of your infrastructure. They're signing up for apps and services, very likely reusing their favorite passwords or an easily guessable password, or maybe a compromised password they may not even be aware of. That's something we see quite a bit of when we deploy.\u003C/p>\u003Cp>One of the things I've noticed — not only at Push, but in my prior life as an enterprise defender — is that getting a notification that you have an account or email address that has shown up in a breach list can be very helpful context, but can also be a recipe for spending some time only to find out that maybe that person left two years ago, they're no longer an active user. Or maybe it's not actually a legitimate email address in your organization, even though your domain might be in there. And I know you've kind of written about this — the fake email problem. A lot of it comes down to how organizations leverage this type of data. In our world, for example, we take that kind of intelligence and match it with a credential that somebody is actively using today. So maybe we flag it with \"hey, this has shown up in a breach list, and also somebody is logging in using this same account right now in your environment.\" Can you talk about why, at the scale you're operating, there are inevitably going to be some anomalies in the data — some things that you can't necessarily just shove into your detection pipeline without doing some validation and checking?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Well, I think the real macro question here is: for an organization — particularly larger ones — when they discover they've got people in a data breach, what next? The first obvious one is that if it is email addresses belonging to employees that no longer exist, or email addresses that might have even been fabricated — every now and then we just see a load of stuff like \"sales@\" every single domain you could imagine — those are usually pretty easy to discard. In most cases, that's not going to make much sense to take any further action with.\u003C/p>\u003Cp>And one of the interesting tangential observations here is that data never really dies. You know, people leave the organization — I was at Pfizer for 14 years. I left there 11 years ago. I'm sure my pfizer.com email address still sits in all of these different online services because I legitimately used them in the course of my job. If they have data breaches later on, that's probably not going to matter to the organization, but yeah, they're going to get an alert, and from our perspective, we don't know who's a current employee or not — we just know it is a valid email address pattern. You could easily discard that.\u003C/p>\u003Cp>Then of course there's the question of: what do you do when you do have a hit against an active employee? I'd suggest that's going to depend very much on the nature of the data breach, the nature of the organization, and possibly the nature of the individual too. At the very least, I'd like to think that every time someone in an organization is in a data breach, there's an education opportunity. One of the things we hear most from law enforcement agencies is: \"We use your service a lot for things like community outreach and to educate people\" — not necessarily to say \"you have to go and respond to these incidents right now,\" but just awareness that everywhere you leave your data may one day appear somewhere publicly. So at the very least, you can say to people: \"Just so you know, you've been in X, Y, Z data breach — you probably need to be conscious that your information is floating around.\"\u003C/p>\u003Cp>Then of course, depending on the nature of the service, there might be different action involved. There are a surprisingly large number of corporate, government, and military email addresses in adult website data breaches. I'd argue the discussion you have with someone then might be different to the discussion you have around, say, them being in some online e-commerce service.\u003C/p>\u003Cp>The other problem I'm seeing is almost like a second order of criminality that often happens around data breaches. I loaded an education sector one just last week, and very shortly after that, I saw people saying, \"I'm getting extortion emails.\" People were getting emails saying, \"You have been in this data breach, we know you're in this data breach\" — and now the recipient goes, \"Oh wow, yeah, I was. This is a little bit of social engineering — they're telling me something that's true.\" And then they go on to make claims about having malware on the computer and catching them doing things they wouldn't want to be caught doing on video camera — \"please send Bitcoin now.\" And that's a discussion which might also be important if a corporate email address is now being used to extort someone for money. That's something most organizations like to know about.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Yeah, that's interesting. And I would guess there might even be some overlap there — we know there are some adversary groups, state-sponsored and otherwise, that try to recruit insiders and flip them to provide sensitive data or access. I wonder if there's any overlap there as well — not just financial extortion.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Well, that's possibly the gateway, right? That's possibly the entry point. If you can start to build a picture about someone and create a rich profile of them for someone who's trying to recruit an insider, the more information you've got, the more valuable it's going to be.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Absolutely. Well, on that scary note — there's one more area I wanted to get into here. Now that you've been doing this for a while, as we've established, you've built up this phenomenal dataset. I know you work with a lot of law enforcement agencies and many different organizations. Just a best guess: how many breach notifications do you think you've sent since the project started?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Every now and then I do a count on this. We send many millions every year. We've got about six and a half million individuals we send breach notifications to. We've got 400,000 domains being monitored on the service, which includes more than half the Fortune 500. There was a data breach I loaded this morning, and one of my test domains — it's a real organization that I use to validate some of our processes — there were more than a thousand people on this one breach. The numbers are just staggering, and as we said earlier, there's just nothing slowing it down either.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> That is staggering. And I'm going to ask you another best-guess question: out of all those notifications — many millions a year — if you had to guess the percentage of those that result in some kind of meaningful action, and I know you may not always see the other side of that, but if you had to take a guess — what kind of impact do you think that's having? Even if it's just internal education, not necessarily full-blown incident response. What would you put that percentage at?\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> That's a great question. I wish I knew how to measure that. I think to give you a half answer, because I don't have an exact one — I would like to think there are multiple different outcomes. In some cases, I know it's resulted in organizations speaking to employees about the exposure of their data. I know in many cases it's helped individuals who've said, \"Ah, now I have a potential answer as to why I keep getting all this spam.\" And I'd also like to think that in many cases it has led to people proactively changing their behavior before they do have some sort of nasty data breach — maybe they've gone and gotten a password manager and made all their passwords strong and unique, and when they are involved in an incident later on, it wouldn't have been as bad as it would've been otherwise. We have hundreds of thousands of people a day use the service, hundreds of thousands of organizations using it. So there must have been some good come out of it, but I have no idea how to measure it.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> The numbers kind of speak for themselves, I suppose. But I think you touched on something I want to really emphasize — taking that kind of awareness and then acting on it to put in more guardrails around how people access their accounts, identity hygiene, and things like that. That seems like a positive impact even if you can't quantify it. Whenever I see that in the wild — \"we've implemented MFA,\" or \"we've gone to stronger, phishing-resistant MFA\" — I know you've had some personal experience with those kinds of attacks yourself. It seems like that's a win, even if you can't necessarily quantify the impact. Would you say that's fair?\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, look — I think it's about positive behavioral changes. And what you politely alluded to just there is that I got phished myself, about a year ago.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Happens to the best of us.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> My password out of 1Password got phished. My OTP out of 1Password got phished, because it was a phishable form of two-factor authentication. And as a result, my mailing list got exposed. So I had to put my own mailing list into Have I Been Pwned and then email all my subscribers — which was, to be honest, slightly embarrassing. But I think to come back to your point — where it was really valuable is that it got a lot of press around how even I can be phished, and the vulnerability of phishable two-factor authentication, and the importance of things like passkeys and non-phishable two-FA mechanisms. So maybe that was a bit of an example — like Have I Been Pwned itself — where people use that experience to hopefully make things better for everybody else.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Yeah, absolutely. And I guess by that interesting metric we talked about earlier, that now means that you are, in fact, a real person — you're showing up in a breach, right?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> I was already in like 36 data breaches — I mean, literally have been pwned several dozen times already. And it just comes out of nowhere. My wife the other day suddenly got an email from Have I Been Pwned because she'd bought Canada Goose, and then Canada Goose — because they're one of the victims of Shiny Hunters — yeah.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> So that made it easy to verify when your own data's in there. But I think when you talk about strong authentication — you still got phished. And I think that's also a decent case study in how MFA — some MFA is better than none, and FIDO2 tokens and those kinds of mechanisms being the strongest — but even then, on the defensive side, we're seeing a lot of post-authentication attacks. Even as good as those controls are, MFA and phishing-resistant MFA isn't a panacea any more than any other security control. You can still be targeted. Some of this stuff can still work. And in fact, some of the things in the Shiny Hunters' playbook still work even if you have really strong types of MFA in place.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, and that was an example of one of those platforms-as-a-service or software-as-a-service products. Genesis Markets got taken down a couple of years ago, and that was literally cookie material — post-auth. So you can have the world's best non-phishable two-FA, but a stolen cookie gets you in because it replays the session and had browser fingerprints and things in it as well. Then you've still got a problem. And it also reinforces the need for technical controls that are separate and complementary to the human controls. Obviously in my own case, getting phished — the human controls broke down. Unfortunately there weren't sufficient technical controls in order to save me from myself. So we really need both.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Very well said. And the last thing I want to touch on here, Troy — and I'm sure this will come as a shock to you — artificial intelligence. Apparently a big deal. Who knew? I know you've done some writing about this. I was hoping you could talk a little bit about Bruce and some of your work in this area — what you've learned applying that toolset in your own work, what you've seen, what works, what doesn't work as well as you might have thought.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> I think to start with a very objective observation: everyone's trying to figure out where the value is — what's the stuff it actually does well, versus the stuff where it creates images of people with funny teeth and fingers. You're trying to work out, \"how do I use this in a way that's productive for me as a business and hopefully in the best interest of the world as well?\" We're trying to figure out that sweet spot.\u003C/p>\u003Cp>So the experiment we've been doing at the moment is trying to respond to our support tickets for Have I Been Pwned more efficiently, by using an instance of Claude that interacts with our customers on Zendesk, under a persona we call Bruce — because we just picked the most Australian name we could find. What he's doing now is we treat him like a junior employee. We do refer to him as a person. So it is Bruce the bot. Bruce the bot has his own account in Zendesk. He doesn't have access to my account or to anyone else's account. He has all these locked-down rights. He's got access to a couple of different services under his own identity, just like we'd give a junior employee. So if he goes completely rogue or does something stupid, he's pretty sandboxed in terms of his access.\u003C/p>\u003Cp>And where we're finding the sweet spot is not to make him a fully autonomous bot that's completely detached from humans, but to have him actually augment the work that we do. So Bruce pops up and says, \"Hey, someone's logged a ticket. They're asking how to cancel their subscription. This is the response I want to give them — does that sound okay?\" And we can either say \"yes, go ahead\" or we can give him a prompt. Particularly when it gets more complex — we had someone a couple of days ago who kept asking the same question over and over again, and I just told Bruce, \"This person's obviously just being difficult. Just summarize everything that they've sent and give it back to them.\" So Bruce went through it: \"At this date and time you said this, then I said this, then I said this.\" It was almost like playing defense for the humans — keeping us from, in this case, a rather belligerent customer.\u003C/p>\u003Cp>It's almost like a human-augmented AI. I think if we still have the human touch — he doesn't do anything without our okay — we're able to do things much faster and more efficiently. And then as we find particular paths where we can really reliably and confidently give the right answer — someone says \"how do I cancel my subscription?\" — there's a very clear answer for that, and we'll give Bruce a little bit more leash. Just like you would with a junior employee: you invest time upfront, but you want them to be able to act more autonomously over time. And I think for us at the moment, that seems to be the best path forward.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> That's fantastic. And I really like what you said there about treating Bruce as a junior employee. From our side, that's something we've seen work quite well too — using AI as augmentation to do what our research team could do, but maybe would take them longer to do manually. Really great as an assistive technology. And back to your point about the junior employee: it's fascinating to me how many of these AI problems are actually problems we've dealt with before — just at a slightly larger scale. Vibe-coded software, bugs and vulnerabilities — that's not exactly a new problem. Over-authorizing a new junior employee — not a particularly new problem either. So I'm encouraged to hear that the approach is \"keep it on a leash, put those guardrails in place, don't over-authorize the agent to do things you don't want it doing\" — just as you would with a junior employee you're bringing in.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Yeah, so it makes a lot of sense. It's almost like the same human challenges we had before, just transcended into a new era. Even to the point where now on my weekend I was writing a \"Robophobia policy.\" A robophobia policy — people who refuse to speak to the robot. They say, \"I'll only speak to a human.\" And I'm a little bit cautious about how I word this, but it kind of feels like other areas of discrimination in life, where someone says, \"I will not have anything to do with you because of your makeup — I'll only talk to someone else.\" Now, for us as well, we are literally instructing the robot. So when someone says, \"I don't want to talk to this person because it's not a sentient being\" — maybe there's a little bit of humor involved here as well — but I don't want people to be scared of the robots. I want them to embrace Bruce and all his silicon-based brethren.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Right. Very well said. Well, I think that's about it for our time. Troy, I want to be respectful of yours as well. Before we break — for those of you watching who have questions for Troy or myself, please feel free to leave them in the comments. We'll do our best to consolidate those, summarize them, and maybe we can speak to some of those questions. We'll make sure we mention you, Troy, if you want to jump in, or maybe we can task Bruce to answer some of them — we can work something out.\u003C/p>\u003Cp>But, Troy, any other projects, trainings, talks, or initiatives you want to call out before we end the session?\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Any events or talks I have coming up are on my events page, listed on the front of troyhunt.com. I've got a little bit more international travel coming up this year — mostly European stuff, some online things. Otherwise everything is on troyhunt.com and all the social things are linked off there.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Mark:\u003C/strong> Okay, well there you have it. And if you're not reading Troy's blog, I don't know why — make sure you do that. You can also check out the Push Security blog at our website, where we write about a lot of the types of threats we've talked about today and share a lot of our research. If you want to book a demo of Push Security, you can also do that at our website. And with that — Troy, thank you again very much for joining me. Really appreciate it. Hope to talk to you again soon.\u003C/p>\u003Cp>\u003Cbr>\u003C/p>\u003Cp>\u003Cstrong>Troy:\u003C/strong> Thanks, Mark. Cheers.\u003C/p>",{"large":1408},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"marginLeft":347,"lineHeight":1393,"fontSize":70,"paddingTop":346},{"@type":47,"@version":48,"id":1410,"meta":1411,"component":1413,"responsiveStyles":1418},"builder-4e84a315ca6d489b910dee71876c4023",{"previousId":1412},"builder-e6a38f47e22d4f90a801cbc7570260eb",{"name":1414,"tag":1414,"options":1415,"isRSC":61},"CTAButton",{"align":1311,"size":85,"text":1416,"redirect":1417,"redirectOpenInNewTab":34},"Contact Us","https://pushsecurity.com/contact/",{"large":1419,"medium":1421,"small":1422},{"display":83,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"pointerEvents":1294,"marginTop":1420},"2rem",{"display":83},{"display":83},{"@type":47,"@version":48,"id":1424,"component":1425,"responsiveStyles":1429},"builder-0c518fe2625346c0ac873722b3fcfe41",{"name":1426,"options":1427,"isRSC":61},"Custom Code",{"code":1428,"scriptsClientOnly":6},"\u003Cstyle>\n          h1 strong {\n          -webkit-text-fill-color: transparent;\n          -webkit-text-fill-color: transparent;\n          background-image: linear-gradient(14deg, #ff9d29 35%, #e73918 73%);\n          -webkit-background-clip: text;\n          background-clip: text;\n          font-weight: inherit;\n      }\n      .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block .text-lg.text-white {\n        font-size: .9rem;\n      }\n\n      .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block img.rounded-full {max-height: 50px; max-width: 50px;}\n\n        .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block img:not(rounded-full) {max-height: 80px; margin-right: 20px;}\n\n  .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block .w-\\[156px\\] {\n    margin-left: 0px;\n    row-gap: .2rem;\n    place-self: flex-start;\n    margin-top: 10%;\n  }\n\n    @media (min-width: 991px) {\n        .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block .w-\\[156px\\] {\n        width: 200px;\n    }\n    }\n\n    @media (max-width: 500px) {\n      .builder-blocks.component-5vz8uirn7sc .builder-40050246ea2e4f968aed35a82a072181.builder-block .builder-text p {\n      text-align: center;\n      margin-top: 1rem;\n      margin-bottom: 2rem;\n      }\n    }\n\n    @media (max-width: 900px) {\n      .builder-96f5292568664bdd8f0e0fd3e2114f2d.builder-block .flex.gap-2.items-center {\n          flex-flow: column-reverse;\n      }\n\n      .builder-989bcb32230d4663b401271e6fd13ad3 {\n    margin-right: auto;\n    margin-left: auto;\n      }\n\n    }\n\u003C/style>\n",{"large":1430},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68},50,"tablet",{"large":1434,"small":1438},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":347,"maxWidth":1435,"marginTop":1436,"paddingRight":347,"marginRight":1437,"marginLeft":1437},"1320px","-2px","180px",{"marginLeft":347,"marginRight":347,"marginTop":347},{"@type":47,"@version":48,"id":1440,"meta":1441,"component":1443,"responsiveStyles":1518},"builder-ab0d9c67a45a4802b8871c7d3e1edc75",{"previousId":1442},"builder-486093035df84e51a59921c1017aec45",{"name":1280,"options":1444,"isRSC":61},{"columns":1445,"space":1431,"stackColumnsAt":1432,"reverseColumnsWhenStacked":6},[1446,1469],{"blocks":1447,"width":1468},[1448,1458],{"@type":47,"@version":48,"id":1449,"meta":1450,"component":1452,"responsiveStyles":1455},"builder-5fa4560c039f44bf901e189a83799353",{"previousId":1451},"builder-85b13f5abb664b289149d28ac11c3b4f",{"name":1379,"options":1453,"isRSC":61},{"videoId":1454},"SWwDkIlYgxM",{"large":1456},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingLeft":347,"paddingRight":347,"marginTop":1457,"marginLeft":347,"marginRight":347},"40px",{"@type":47,"@version":48,"id":1459,"component":1460,"responsiveStyles":1466},"builder-95d329e5b2844627955f4fc92b77683a",{"name":1401,"options":1461,"isRSC":61},{"options":1462},[1463],{"optionTitle":1464,"description":1465},"\u003Cp>\u003Cspan style=\"color: rgb(255, 255, 255);\">Agenda:\u003C/span>\u003Cspan style=\"color: rgb(245, 59, 24);\"> Why the Browser is the New Battleground\u003C/span>\u003C/p>\n","\u003Cp>The browser is the new endpoint, and it's under attack. Attacks are happening entirely inside the browser sandbox, targeting applications directly over the internet, and blending in with legitimate web and network traffic, application access, and user activity. This is a significant challenge for security teams. Existing security tools can't get visibility of what's happening inside the browser. Attackers know this, and are ruthlessly exploiting the browser blindspot. This is fuelling a lot of attacker innovation, with new tools and techniques constantly emerging. Push Security VP R&amp;D Luke Jennings is joined by John Hammond, Senior Principal Security Researcher at Huntress, to demonstrate the latest browser-based attack techniques. Ride along with Luke and John as they analyse real-world attacks, covering:\u003C/p>\u003Cul>\u003Cli>ConsentFix, the browser-native ClickFix attack linked to Russian APTs\u003C/li>\u003Cli>Session-stealing, MFA-bypassing phishing campaigns targeting enterprises over LinkedIn and Google Ads\u003C/li>\u003Cli>The latest social engineering tradecraft and detection evasion techniques\u003C/li>\u003Cli>What the future of browser-based attacks looks like and what security teams can do about it\u003C/li>\u003C/ul>\u003Cp>\u003Cbr>\u003C/p>",{"large":1467},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"marginLeft":347,"lineHeight":1393,"fontSize":70,"paddingTop":346},58.333,{"blocks":1470,"width":1517},[1471,1501,1509],{"@type":47,"@version":48,"id":1472,"meta":1473,"component":1475,"responsiveStyles":1497},"builder-0077fbcbc2c84339b29b4503463b0b65",{"previousId":1474},"builder-8b9e69a72e714808ab7f66a11e9221a1",{"name":1325,"options":1476,"isRSC":61},{"hosts":1477},[1478],{"host":1479},{"@type":111,"id":1480,"model":1331,"value":1481},"337362fb31b545459b94e2fabe5324a2",{"createdDate":1482,"id":1480,"name":1483,"modelId":1335,"published":13,"query":1484,"data":1485,"variations":1490,"lastUpdated":1491,"firstPublished":1492,"testRatio":23,"createdBy":91,"lastUpdatedBy":25,"folders":1493,"meta":1494,"rev":1496},1728048684064,"Luke jennings",[],{"name":1486,"avatar":1487,"surname":1488,"jobtitle":1489},"Luke","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F11642369725742b3a5c1e07d840eafda","Jennings","VP Research",{},1747058319359,1728048726793,[],{"breakpoints":1495,"lastPreviewUrl":29,"kind":28,"hasAutosaves":34},{"xsmall":31,"small":32,"medium":33},"58s8n9887sw",{"large":1498,"small":1500},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingLeft":1371,"paddingTop":1499,"marginTop":346},"50px",{"display":83},{"@type":47,"@version":48,"id":1502,"meta":1503,"component":1505,"responsiveStyles":1507},"builder-b0d6468faf0649c6bfb53cae85ce0eec",{"previousId":1504},"builder-9c7f74e3f82347a3b23920b157e7afac",{"name":1288,"options":1506,"isRSC":61},{"text":1390},{"large":1508},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"lineHeight":1393,"height":1294,"fontSize":70,"paddingLeft":1371,"paddingBottom":1371,"textAlign":1311,"paddingTop":1371},{"@type":47,"@version":48,"id":1510,"meta":1511,"component":1513,"responsiveStyles":1515},"builder-274881aaf1cc4ef6af68c2366104aae8",{"previousId":1512},"builder-fe68fb813b894464adc1cd048cdd5819",{"name":1414,"tag":1414,"options":1514,"isRSC":61},{"align":1311,"size":85,"text":1416,"redirect":1417,"redirectOpenInNewTab":34},{"large":1516},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"pointerEvents":1294},41.667,{"large":1519,"medium":1520,"small":1521},{"display":83,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"paddingTop":347,"maxWidth":1435,"marginTop":1436,"paddingRight":347,"marginRight":1437,"marginLeft":1437},{"display":83},{"marginLeft":347,"marginRight":347,"marginTop":347,"display":83},{"@type":47,"@version":48,"id":1523,"meta":1524,"component":1526,"responsiveStyles":1529},"builder-709eb10bf20b4b6997567e19c9dc6254",{"previousId":1525},"builder-051a32ee054d44cb93be4f74b6a8480c",{"name":309,"tag":309,"options":1527,"isRSC":61},{"AllPartners":34,"leftAlignPartners":6,"backgroundTransparent":34,"Partners":1528},[],{"large":1530,"small":1532},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"marginTop":1531,"paddingLeft":1312,"marginLeft":346,"marginRight":346},"30px",{"display":83},{"@type":47,"@version":48,"id":1534,"meta":1535,"component":1537,"responsiveStyles":1546},"builder-b5f9a5a4e1cd4b56907ddf265a0bb7d1",{"previousId":1536},"builder-f4713dcfafe74bb98e5192ff654e3f6f",{"name":1538,"options":1539,"isRSC":61},"Image",{"image":1540,"backgroundSize":1541,"backgroundPosition":1311,"lazy":6,"fitContent":34,"aspectRatio":1542,"lockAspectRatio":6,"noWebp":34,"height":1543,"width":1544,"sizes":1545},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5453e414a4e74bdb81a12aa10eee5e4a?width=1680","cover",0.1219,195,1514,"(max-width: 638px) 88vw, (max-width: 998px) 93vw, 120vw",{"large":1547,"small":1549},{"display":64,"flexDirection":65,"position":66,"flexShrink":67,"boxSizing":68,"width":1548,"minHeight":346,"minWidth":346,"overflow":82,"marginTop":1372,"marginLeft":346,"marginRight":346},"100%",{"marginTop":346,"marginLeft":347,"marginRight":347},{"id":1551,"@type":47,"tagName":74,"properties":1552,"responsiveStyles":1553},"builder-pixel-v2caut9o9ug",{"src":76,"aria-hidden":77,"alt":29,"role":78,"width":67,"height":67},{"large":1554},{"height":67,"width":67,"display":81,"opacity":67,"overflow":82,"pointerEvents":83},{"deviceSize":85,"location":1556},{"pathname":1266,"path":1557,"query":1560},[1558,1559],"resources","yes-youve-been-pwned",{},{},1777581131006,1777561385811,"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F13b33176b5384b29bffb9313b759abc8",[],{"lastPreviewUrl":1567,"originalContentId":1568,"kind":401,"winningTest":61,"hasLinks":6,"breakpoints":1569,"hasAutosaves":6},"https://pushsecurity.com/resources/yes-youve-been-pwned?builder.space=f3a1111ff5be48cdbb123cd9f5795a05&builder.user.permissions=read%2Ccreate%2Cpublish%2CeditCode%2CeditDesigns%2CeditLayouts%2CeditLayers%2CeditContentPriority%2CeditFolders%2CeditProjects%2CmodifyMcpServers%2CmodifyWorkflowIntegrations%2CmodifyProjectSettings%2CconnectCodeRepository%2CcreateProjects%2CindexDesignSystems%2CsendPullRequests%2CmergePullRequests&builder.user.role.name=Developer&builder.user.role.id=developer&builder.cachebust=true&builder.preview=resources-v-2&builder.noCache=true&builder.allowTextEdit=true&__builder_editing__=true&builder.overrides.resources-v-2=81aa98f35767473898a201b6494d3cda&builder.overrides.81aa98f35767473898a201b6494d3cda=81aa98f35767473898a201b6494d3cda&builder.options.locale=Default","eb89df4e8f904e6895dbeb2e94ac1b46",{"xsmall":31,"small":32,"medium":33},"c6nze82yewd",[1572,1588,1603,1617,1631,1644,1658,1672,1686,1700,1714,1728,1742,1756,1770,1784,1798,1812,1826],{"createdDate":1573,"id":1574,"name":1575,"modelId":1576,"published":13,"query":1577,"data":1578,"variations":1581,"lastUpdated":1582,"firstPublished":1583,"testRatio":23,"createdBy":92,"lastUpdatedBy":92,"folders":1584,"meta":1585,"rev":1587},1762986845344,"0d68029bb7e5460b82b89e7db78035e2","SpecterOps Bloodhound","6e0aa39f1f534f48ac5ed2ab6fa144c5",[],{"name":1575,"link":1579,"image":1580},"https://specterops.io/","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Ff21ebeaef1904f618fc30e32a7625e9c",{},1762987070904,1762987070893,[],{"breakpoints":1586,"kind":28,"lastPreviewUrl":29,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},"31np5njxoyx",{"createdDate":1589,"id":1590,"name":1591,"modelId":1576,"published":13,"meta":1592,"query":1594,"data":1595,"variations":1598,"lastUpdated":1599,"firstPublished":1600,"testRatio":23,"createdBy":1601,"lastUpdatedBy":1601,"folders":1602,"rev":1587},1756230565361,"a843202c1c304e7ba860f7a82e84050d","Softcat",{"lastPreviewUrl":29,"breakpoints":1593,"kind":28},{"xsmall":31,"small":32,"medium":33},[],{"link":1596,"name":1591,"image":1597},"https://www.softcat.com/","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6fb577a17bd14cbeb19166583dd1162a",{},1756407116714,1756230629965,"FdqW0cntfvUDN2PtmLkvxDNY6rj1",[],{"createdDate":1604,"id":1605,"name":1606,"modelId":1576,"published":13,"meta":1607,"query":1609,"data":1610,"variations":1613,"lastUpdated":1614,"firstPublished":1615,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1616,"rev":1587},1752222480647,"2e25daca5f4847ac981bd289a313a8de","Vega",{"breakpoints":1608,"kind":28,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"image":1611,"link":1612,"name":1606},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F21f36d006e5a4d988510ede1b8a896e7","https://blog.vega.io/",{},1752500897053,1752500897043,[],{"createdDate":1618,"id":1619,"name":1620,"modelId":1576,"published":13,"meta":1621,"query":1623,"data":1624,"variations":1627,"lastUpdated":1628,"firstPublished":1629,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1630,"rev":1587},1752068182722,"c2d15af470274d51bfe9edf06fd3a839","mazehq",{"breakpoints":1622,"kind":28,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"image":1625,"link":1626,"name":1620},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fe9003fe210264a968250bf60f0aa3435","https://mazehq.com/",{},1752068907758,1752068907744,[],{"createdDate":1632,"id":1633,"name":1634,"modelId":1576,"published":13,"meta":1635,"query":1637,"data":1638,"variations":1640,"lastUpdated":1641,"firstPublished":1642,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1643,"rev":1587},1752048964782,"9de50cbd2c4842aa8c719e0ebc688949","Specterops",{"breakpoints":1636,"kind":28,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"link":1579,"name":1634,"image":1639},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Faa00dec1110844109cfbf5fbce3e3a58",{},1752049162616,1752049162602,[],{"createdDate":1645,"id":1646,"name":1647,"modelId":1576,"published":13,"query":1648,"data":1649,"variations":1652,"lastUpdated":1653,"firstPublished":1654,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1655,"meta":1656,"rev":1587},1750929354932,"4b1615c90308499c87d31ae6b796c47f","Dropzone ",[],{"image":1650,"name":1647,"link":1651},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbf026cd58b284b48bc34352009a808ce","https://www.dropzone.ai/",{},1750933253077,1750930508235,[],{"breakpoints":1657,"lastPreviewUrl":29,"kind":28,"hasAutosaves":34},{"xsmall":31,"small":32,"medium":33},{"createdDate":1659,"id":1660,"name":1661,"modelId":1576,"published":13,"meta":1662,"query":1664,"data":1665,"variations":1668,"lastUpdated":1669,"firstPublished":1670,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1671,"rev":1587},1750857786473,"8e9a93b6f01c42909f01ec9a7bc9311d","Sublime security",{"lastPreviewUrl":29,"breakpoints":1663,"kind":28},{"xsmall":31,"small":32,"medium":33},[],{"name":1661,"image":1666,"link":1667},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd3de6790ce4a47bea6d011873425452a","https://sublime.security/",{},1750931875973,1750857818558,[],{"createdDate":1673,"id":1674,"name":1675,"modelId":1576,"published":13,"meta":1676,"query":1678,"data":1679,"variations":1682,"lastUpdated":1683,"firstPublished":1684,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1685,"rev":1587},1750857712433,"43c9386ac7fc424c8fa8863635f9b9ed","Seemplicity",{"lastPreviewUrl":29,"breakpoints":1677,"kind":28},{"xsmall":31,"small":32,"medium":33},[],{"image":1680,"link":1681,"name":1675},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F5515c17986334630ac1eadd21b9e102e","https://seemplicity.io/",{},1750933248256,1750857782372,[],{"createdDate":1687,"id":1688,"name":1689,"modelId":1576,"published":13,"meta":1690,"query":1692,"data":1693,"variations":1696,"lastUpdated":1697,"firstPublished":1698,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1699,"rev":1587},1750857643997,"ce7daaf6e56846e793cdcfe8d4049672","Run Zero",{"breakpoints":1691,"lastPreviewUrl":29,"kind":28},{"xsmall":31,"small":32,"medium":33},[],{"link":1694,"image":1695,"name":1689},"https://www.runzero.com/","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F3e477edb4bcf4a9a9d701a6562994480",{},1750933258353,1750857704996,[],{"createdDate":1701,"id":1702,"name":1703,"modelId":1576,"published":13,"meta":1704,"query":1706,"data":1707,"variations":1710,"lastUpdated":1711,"firstPublished":1712,"testRatio":23,"createdBy":24,"lastUpdatedBy":24,"folders":1713,"rev":1587},1750856967417,"698c03d8e1a24305afa23537b5a26412","Kodem",{"breakpoints":1705,"kind":28,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"image":1708,"link":1709,"name":1703},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fda3bd934c2754fd39469611672c83b0b","https://www.kodemsecurity.com/",{},1750933262397,1750857210494,[],{"lastUpdatedBy":91,"folders":1715,"data":1716,"modelId":1576,"query":1720,"published":13,"firstPublished":1721,"testRatio":23,"lastUpdated":1722,"createdDate":1723,"createdBy":91,"meta":1724,"variations":1725,"name":1726,"id":1727,"rev":1587},[],{"image":1717,"name":1718,"link":1719},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F6e3d8212521f4c2b890634c886b7eaa8","Sophos","https://sophos.com/",[],1728054150614,1728054150622,1728054083810,{"kind":28,"lastPreviewUrl":29},{},"sophos","548de6421552411085112240e67a230f",{"createdDate":1729,"id":1730,"name":1731,"modelId":1576,"published":13,"meta":1732,"query":1734,"data":1735,"variations":1738,"lastUpdated":1739,"firstPublished":1740,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"folders":1741,"rev":1587},1728054020158,"8b22dd146ec549b1a7283610478a3946","Gitlab",{"lastPreviewUrl":29,"kind":28,"breakpoints":1733},{"xsmall":31,"small":32,"medium":33},[],{"image":1736,"link":1737,"name":1731,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fbecdf8927c6a406ca0d7614e005dce03","https://gitlab.com/",{},1750854836105,1728054205998,[],{"createdDate":1743,"id":1744,"name":1745,"modelId":1576,"published":13,"meta":1746,"query":1748,"data":1749,"variations":1752,"lastUpdated":1753,"firstPublished":1754,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"folders":1755,"rev":1587},1728054279189,"861f0e5dc1d744b592db4e3eb4c6c92b","Cribl",{"lastPreviewUrl":29,"kind":28,"breakpoints":1747},{"xsmall":31,"small":32,"medium":33},[],{"name":1745,"image":1750,"link":1751,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1e9e8d388bc14597968d404fa0dd7f99","https://cribl.io/",{},1750854842979,1728054315303,[],{"createdDate":1757,"id":1758,"name":1759,"modelId":1576,"published":13,"meta":1760,"query":1762,"data":1763,"variations":1766,"lastUpdated":1767,"firstPublished":1768,"testRatio":23,"createdBy":25,"lastUpdatedBy":91,"folders":1769,"rev":1587},1731417861051,"b5cb3b0fc4d94c4781dd9a7990326d47","greynoise",{"kind":28,"breakpoints":1761,"lastPreviewUrl":29},{"xsmall":31,"small":32,"medium":33},[],{"image":1764,"name":1759,"link":1765,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fb99292e4117247a18ccaa247d0e834f3","https://www.greynoise.io/",{},1750854853280,1731417987334,[],{"createdDate":1771,"id":1772,"name":1773,"modelId":1576,"published":13,"query":1774,"data":1775,"variations":1778,"lastUpdated":1779,"firstPublished":1780,"testRatio":23,"createdBy":92,"lastUpdatedBy":25,"folders":1781,"meta":1782,"rev":1587},1762360849887,"d6ad52fc61ec4cd69a99ce0654e761d9","Ramp",[],{"image":1776,"name":1773,"link":1777,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F321fc32cbac54856af4aeb4e4ec5ebe0","https://ramp.com/",{},1762957426946,1762360924931,[],{"lastPreviewUrl":29,"kind":28,"breakpoints":1783,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},{"createdDate":1785,"id":1786,"name":1787,"modelId":1576,"published":13,"query":1788,"data":1789,"variations":1792,"lastUpdated":1793,"firstPublished":1794,"testRatio":23,"createdBy":25,"lastUpdatedBy":25,"folders":1795,"meta":1796,"rev":1587},1731418000864,"51c6261d939a4549b4ad871c886a4f43","Riskledger",[],{"link":1790,"showInGlobalList":6,"image":1791,"name":1787},"https://riskledger.com/","https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F0aa25eddafa0421ea6b7834d3eeecb58",{},1763020144174,1731418028971,[],{"kind":28,"lastPreviewUrl":29,"breakpoints":1797,"hasAutosaves":6},{"xsmall":31,"small":32,"medium":33},{"createdDate":1799,"id":1800,"name":1801,"modelId":1576,"published":13,"meta":1802,"query":1804,"data":1805,"variations":1808,"lastUpdated":1809,"firstPublished":1810,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"folders":1811,"rev":1587},1728563630527,"388c99a4e6c542979bb75e0446cd1b6e","upvest",{"breakpoints":1803,"lastPreviewUrl":29,"kind":28},{"xsmall":31,"small":32,"medium":33},[],{"image":1806,"link":1807,"name":1801,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F7019b2161662442e80e83c8a32cf5ca7","https://upvest.co/",{},1750854868363,1728563705239,[],{"createdDate":1813,"id":1814,"name":1815,"modelId":1576,"published":13,"meta":1816,"query":1818,"data":1819,"variations":1822,"lastUpdated":1823,"firstPublished":1824,"testRatio":23,"createdBy":91,"lastUpdatedBy":91,"folders":1825,"rev":1587},1728054217478,"9a1849dd3ae649d8ab912ee95e94ad62","Thinkst",{"kind":28,"lastPreviewUrl":29,"breakpoints":1817},{"xsmall":31,"small":32,"medium":33},[],{"image":1820,"name":1815,"link":1821,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2F1ee4bf9428a04d23807c37149c65c242","https://thinkst.com/",{},1750854874682,1728054257265,[],{"createdDate":1827,"id":1828,"name":1829,"modelId":1576,"published":13,"meta":1830,"query":1832,"data":1833,"variations":1836,"lastUpdated":1837,"firstPublished":1838,"testRatio":23,"createdBy":25,"lastUpdatedBy":91,"folders":1839,"rev":1587},1731659785528,"1aa9970baca241609af62334a9191957","Portswigger",{"kind":28,"lastPreviewUrl":29,"breakpoints":1831},{"xsmall":31,"small":32,"medium":33},[],{"image":1834,"name":1829,"link":1835,"showInGlobalList":34},"https://cdn.builder.io/api/v1/image/assets%2Ff3a1111ff5be48cdbb123cd9f5795a05%2Fd063a13264454d3ebcc9b8d91220cf5f","https://portswigger.net/",{},1750854882899,1731659822109,[],1777585412348]