Martech logo
Abnormal was nominated for MISA membership based on how its platform uses Microsoft Azure Active Directory APIs to model and understand known good behavior, and thereby precisely detect and remediate socially-engineered, business email compromise (BEC) attacks, including account takeover.
Read More
Symbol light blue
MISA is comprised of independent software vendors and managed security service providers that have integrated their solutions to help customers better defend themselves against cyber threats. The Abnormal AI threat detection engine integrates with the Azure Active Directory APIs listed above and then models the identity of both employees and external senders to create relationship graphs and analyze email content to detect BEC attacks.
Read More
Silicon angle logo
T-Mobile confirms it was hacked again
August 16, 2021
Silicon Angle
T-Mobile USA Inc. today confirmed that reports over the weekend that it was hacked, although it declined to provide specific details. The company launched an investigation after a hacker named “Subvirt” advertised allegedly stolen data on the popular hacking site Raid Forums. While the hacker or hackers did not name T-Mobile, they did so when contacted by several media outlets.
Read More
Readers digest logo
Due to social distancing matters, most of us are now relying on Zoom to have work meetings, keep up with online classes, have virtual “outings” with our friends and so much more. So it’s not very surprising that scammers have been using Zoom to steal people’s personal information.
Read More
Austin business journal logo
5 things businesses should know about fighting fraud
July 1, 2021
Austin Business Journal
No business is immune to the risks of fraud – especially during times of market uncertainty or economic downturn. On the heels of the Covid-19 pandemic, organizations have seen an uptick in both internal and external fraud attacks; the FBI’s Internet Crime Complaint Center received a record number of complaints in 2020 with reported losses exceeding $4.1 billion.
Read More
Dark reading logo
At the recent RSA Conference, malware detection got the cold shoulder among the 10 Innovation Sandbox finalists, illustrating how differently security looks after the pandemic cloud migration. It also indicates the investor community may consider malware a lower priority.
Read More
Crunchbase logo
In an industry with popular buzzwords like “zero-day” and “honeypots,” and more acronyms than one can shake a stick at, email security can sometimes get lost in the noise.
Read More
Cso logo
The CSO is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
Read More
Dark reading logo
RSA Conference 2021, appropriately themed "Resilience" in this post-pandemic year, is upon us as an immersive virtual event. As an American-Israeli VC firm exclusively focused on early-stage cybersecurity investments in Israeli startups, we are on top of industry trends, and each year we compile a list of must-attend sessions.
Read More
Arn logo
Security start-ups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management, zero-trust, and more.
Read More
Tech radar logo
Email attacks related to federal taxes are likely to hit a peak in advance of the extended May 17 deadline, new research has claimed. Security firm Abnormal Security has used its analysis of historical data combined with their own attack detection processes to pinpoint the expected spike in malicious email activity - and it's coming soon.
Read More
Ai thority logo
Mike brings Fortune 500-caliber security leadership experience that will not only drive the company’s security and privacy program but also help influence the development and support of the Abnormal Security platform to ensure it delivers lasting value to customers.
Read More
Symbol green 03w
Former Global Chief Security & Privacy Officer at Alliance Data Brings Valuable Experience and Understanding of Large Enterprise Needs to Help Company Deliver Lasting Value to Customers
Read More
Cybercrime magazine logo
10 Hot Email Security Companies To Watch In 2021
April 16, 2021
Cybercrime Magazine
Email filtering software has been around for ages, but its role as protector of the enterprise gateway has spawned a cycle of innovation as vendors embrace and refine artificial intelligence techniques to dramatically increase the accuracy and specificity of email security.
Read More
Symbol purple 01b
Abnormal Security today announced the company has been named one of 10 finalists for the RSA Conference 2021 Innovation Sandbox Contest for its breakthrough cloud-native email security platform that stops modern email attacks through behavioral data science. On Wednesday, May 19, Abnormal Security will present its email security platform to a panel of renowned industry judges.
Read More
Towards data science logo
How you Should Design ML Engineering Projects
April 5, 2021
Towards Data Science
Machine learning engineering is hard, especially when developing products at high velocity (as is the case for us at Abnormal Security). Typical software engineering lifecycles often fail when developing ML systems.
Read More
Silicon angle logo
Researchers at Google LLC’s Threat Analysis Group are warning that the same North Korean hackers who targeted security researchers earlier this year have now set up a new website and fake social media profiles for a fake company called “SecuriElite.”
Read More
Enterprise security tech logo
Google's Threat Analysis Group (TAG) has reported that the very same North Korean threat actors, dubbed Zinc, that targeted security researchers back in January 2021 have engaged in a new campaign that includes the spin-up of a fake security company called SecuriElite. SecuriElite comes complete with fake Twitter and LinkedIn accounts and aims to trick security pros into falling into a malicious cyber-espionage trap.
Read More
Bleeping computer logo
The Internal Revenue Service (IRS) is warning of ongoing phishing attacks impersonating the IRS and targeting educational institutions. The attacks use tax refund payment baits and mainly focus on universities' staff and students with .edu email addresses.
Read More
Silicon angle logo
The U.S. Federal Bureau of Investigation has delivered its annual internet crime report based on information from 791,790 complaints in 2020, far surpassing 300,000 complaints in 2019. The report found that the top three crimes reported by victims in 2020 were phishing scams, nonpayment or nondelivery scams and extortion. Victims lost the most money to business email compromise scams, romance and confidence schemes and investment fraud.
Read More
Fox news logo
The government and a cybersecurity expert are warning about fresh stimulus payment scams. The Financial Crimes Enforcement Network (FinCEN), part of the U.S. Department of the Treasury that combats financial crimes, listed some of the most common Economic Impact Payment (EIP) fraud in a recent advisory.
Read More
Symbol yellow 01w
Abnormal Security today announced its placement on Fast Company’s prestigious annual list of the World’s Most Innovative Companies for 2021 for its breakthrough cloud-native email security platform that stops modern email attacks through behavioral data science. The list honors the businesses that have not only found a way to be resilient in the past year, but also turned those challenges into impact-making processes.
Read More
Cybersecurity dive logo
If the security community learned anything from the SolarWinds cyberattack, it was that threat actors do a better job assessing where to find vulnerabilities than cybersecurity teams do at assessing risk. This was a supply chain attack, where one company was hacked in order to bring chaos to other, often bigger, businesses.
Read More
Enterprise security tech logo
With so many people working from home on their personal devices during the coronavirus pandemic, cybersecurity has gotten more important than ever. Security companies have developed new ways to protect people from malicious activity on their phones and computers—even when they’re on their own—by detecting phishing messages, political misinformation, denial-of-service attacks, and other types of cyberattacks.
Read More