Push Security, a company specializing in browser-based detection and response, has published its Phishing Detection Evasion Techniques matrix, providing a new perspective on modern phishing attack methodologies and their ability to circumvent traditional detection controls.
“This resource gives defenders a clearer picture of how sophisticated attackers are actually operating in the wild— and how traditional security controls are being outmaneuvered,” stated Jacques Louw, Chief Product Officer at Push Security. Modern phishing attacks frequently bypass established email and network-based defenses. Attackers are increasingly employing alternative delivery channels, such as instant messaging platforms, social media, and malicious advertisements. They also camouflage phishing links by misusing legitimate applications and services, alongside incorporating bot protection, obfuscation, and runtime anti-analysis features, making detection by automated systems more challenging. Louw emphasized, “Handling phishing the same way we did 10 or 15 years ago just isn’t an option anymore.”
The Phishing Detection Evasion Techniques matrix expands on Push Security’s prior SaaS Attacks Matrix, reinforcing the company’s commitment to assisting security teams in visualizing and countering real-world identity threats across contemporary attack surfaces. Key attributes of the matrix include mapping Tactics, Techniques, and Procedures (TTPs) across all phases of the phishing lifecycle, such as target reconnaissance, lure crafting, link camouflage, anti-analysis, and multi-factor authentication (MFA) bypass. It also provides real-world examples of how these techniques are deployed by attackers and is designed for operational use by security teams for testing phishing controls.
This new framework is released at a time when phishing attacks are becoming more targeted, evasive, and costly, particularly as organizations transition to identity-based security models. According to the 2025 Verizon Data Breach Investigations Report dataset, phishing served as the initial point of compromise in 37% of all breaches, making it the most common single access vector. Furthermore, phishing attacks are estimated to cost businesses approximately $4.76 million per breach, primarily due to compromised credentials, lost productivity, incident response expenses, and subsequent damage to applications and data. The Phishing Detection Evasion Techniques Matrix is publicly available on GitHub.
Push Security focuses on bringing active security to the browser to prevent identity attacks like phishing, credential stuffing, and session hijacking, thereby securing an organization’s entire identity perimeter. The company positions itself as an industry-first identity security platform utilizing a browser agent to monitor and defend workforce identities, akin to Endpoint Detection and Response (EDR) but applied within the browser environment. Security teams leverage Push Security to map their identity attack surface, detect and respond to advanced identity attacks in real time, and proactively enhance their overall identity security posture. Founded by former red team members with expertise in offensive security and security operations, Push Security is supported by investors including Decibel, GV (Google Ventures), Redpoint Ventures, Datadog Ventures, and B3 Capital.