Identity investigation and response
See how identity attacks unfold – live in the browser
Investigate faster with real-world session context
Contain threats and drive response with actionable data across user activity, the DOM, and network traffic
Identity is the new perimeter
Identity is the new perimeter
Identity attacks don’t just leave traces in logs, they happen right in front of users. Push turns the browser into a detection and response point, capturing the session data and attacker behavior your other tools miss. It’s like EDR – but built for the browser, the place work gets done.
How the browser became the main cyber battleground
How attacks have moved away from endpoints and internal networks to the browser — a blind spot for traditional security tools.

Dan
Aug 15, 2025
// Read more
How attackers are using Active Directory Federation Services to phish with legit office.com links
Push recently identified a novel phishing attack using Active Directory Federation Services to get Microsoft to send victims to a phishing site.

Luke
Aug 12, 2025
// Read more
Introducing our guide to phishing detection evasion techniques
Introducing our latest resource for security teams breaking down the techniques that modern phishing attacks are using to evade detection.

Jacques
Aug 6, 2025
// Read more