Push invites you to their event

Phishing 2.0 - Detecting Evilginx, EvilnoVNC, Muraena and Modlishka

About this event

Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute AitM and BitM attacks and bypass traditional phishing prevention controls such as MFA, EDR, and email content filtering.

They're not only harvesting credentials, but stealing live session logins for high-value platforms like Okta and MS365.

In this webinar, our VP R&D, Luke Jennings, will demo how these tools work as well as how Push uses browser telemetry to detect these toolkits running on webpages and block users from accessing them.

Hosted by

  • Team member
    T
    Dan Green

  • Team member
    T
    Luke Jennings

Push

Stop identity attacks

Push stops identity-based attacks. A browser-based agent observes identities as employees use or create them and generates a unique telemetry source that can be viewed in the Push platform or forwarded to SIEM/SOAR.