Live Industry Session to Break Down Emerging Phishing Tactics

Deep dive into attacker evolution

Push Security is hosting a live webinar on December 17, offering a thorough breakdown of the phishing tactics that defined 2025 and the new manipulation techniques gaining traction. The session will dissect real-world campaigns, including identity-spoofing workflows, MFA-bypass methods, and increasingly automated social-engineering sequences adopted by both criminal crews and state-aligned groups.

Focus areas for the discussion

– Shifts in attacker psychology and persuasion mechanics
– New delivery channels beyond email (SMS, collaboration apps, AI chat vectors)
– Emerging “trust-surface” attacks targeting SaaS, browser extensions, and authentication flows

Strategic insight into evolving risk patterns

The briefing aims to give defenders a clear picture of how phishing is evolving into multi-stage intrusion chains rather than simple credential-stealing attempts. Presenters will outline how phishing now intersects with token theft, session hijacking, browser-based persistence, and automated reconnaissance.
The goal is to help teams anticipate attacker behaviour instead of reacting to single incidents.

Key takeaways highlighted by organizers

– Techniques most likely to dominate 2026
– Indicators defenders routinely miss during early-stage intrusions
– Defense patterns that counter both automated and human-driven phishing waves

Audience groups positioned to benefit most

The event is tailored for security teams navigating a surge in employee-targeted attacks across SaaS and cloud environments. Incident responders, SOC analysts, product-security engineers, IAM specialists, and CISOs will gain practical intelligence for tightening their defensive posture going into 2026.

Practical value for attendees

– Better alignment of phishing-response workflows
– Updated risk models for cloud-identity abuse
– Playbook improvements for containment and triage

Registration details and access

The webinar is free to join, with registration available through Push Security’s official site. Attendees will receive the session recording, supplementary materials, and actionable guidelines for updating security controls ahead of 2026’s threat landscape.