Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Blog Posts

Blog series c cover
When we raised our Series B funding 18 months ago, I promised our customers greater value, more capabilities, and better customer support. We’ve delivered on each of those promises and as we receive an even larger investment, I’m excited about how we can continue to further deliver on each of them.
Read More
Blog fbi ic3 cover
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Read More
Blog phone fraud cover
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
Read More
Blog gartner cover
The dedication to our customers from across the company, from engineering to sales, from marketing to customer success, ensures that when you work with Abnormal, you receive the best experience possible—while stopping all of the attacks that bypass other solution
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

All Blog Posts
B 05 13 22 Spring Product Release
This quarter, the team at Abnormal launched new features to improve lateral attack detection, role-based access control (RBAC), and explainable AI. Take a deep dive into all of the latest product enhancements.
Read More
B 05 11 22 Champion Finalist
Abnormal has been selected as a Security Customer Champion finalist in the Microsoft Security Excellence Awards! Here’s a look at why.
Read More
Blog series c cover
When we raised our Series B funding 18 months ago, I promised our customers greater value, more capabilities, and better customer support. We’ve delivered on each of those promises and as we receive an even larger investment, I’m excited about how we can continue to further deliver on each of them.
Read More
B 05 09 22 Partner Community
It’s an honor to be named one of CRN’s 2022 Women of the Channel. Here’s why I appreciate the award and what I love about being a Channel Account Manager at Abnormal.
Read More
B 05 05 22 Fast Facts
Watch this short video to learn current trends and key issues in cloud email security, including how to protect your organization against modern threats.
Read More
B 05 03 22
Like all threats in the cyber threat landscape, ransomware will continue to evolve over time. This post builds on our prior research and looks at the changes we observed in the ransomware threat landscape in the first quarter of 2022.
Read More
B 04 28 22 8 Key Differences
At Abnormal, we pride ourselves on our excellent machine learning engineering team. Here are some patterns we use to distinguish between effective and ineffective ML engineers.
Read More
B 04 26 22 Webinar Re Replacing Your SEG
Learn how Microsoft 365 and Abnormal work together to provide comprehensive defense-in-depth protection in part two of our webinar recap.
Read More
Blog mitigate threats cover
Learn about the most common socially-engineered attacks and why these tactics are still so successful—despite a growing awareness from employees.
Read More
B Podcast Engineering8
In episode 8 of Abnormal Engineering Stories, Kevin interviews Saminda Wijegunawardena, an engineering leader who is no stranger to fast-growing enterprise startups.
Read More
B 04 04 22 Webinar Recap Krebs
High-impact emails are on the rise and secure email gateways (SEGs) don’t have the functionality to mitigate them. Learn how your SEG is letting you down.
Read More
B 04 19 22 Facebook Phishing
While phishing emails have long been a popular way to steal Facebook login credentials, we’ve recently seen an increase in more sophisticated phishing attacks.
Read More
B 04 19 22 What CIS Oneedto Know
The email threat landscape is evolving fast. Discover the new tactics cybercriminals are using and how to reduce your risk of falling victim to these modern email attacks.
Read More
Cover Threat of Phishing Blog 04 12 22
Successful phishing attacks have increased by 34% in the last year, making it the most common email attack. Learn why phishing is so dangerous.
Read More
B 04 08 22 Supply Chain
The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.
Read More
B 04 07 22 Company Award
Abnormal is excited to be named a Great Place to Work and one of America’s Best Startup Employers, showcasing our incredible culture and people.
Read More
B 04 06 22 BEC threat report
Business email compromise (BEC) attacks have increased considerably over the past 6 months. Here’s how cybercriminals are changing their targets and tactics.
Read More
B 04 05 22 RAT
Threat actors are posing as businesses and individuals seeking tax preparation services and then providing copies of the Sorillus client remote access tool (RAT).
Read More
B 04 1 22 Sophisticated Lateral Phishing Email Attacks
See how the Abnormal platform has improved the effectiveness of lateral attack detection and how it stops the most advanced attacks.
Read More
B 03 31 22 Design for the Unknown
Hear how Lily Li, Product Designer at Abnormal, broke into the world of email security and learn how you can successfully start a role in a new industry.
Read More
Blog legacy seg ic3 cover
There’s no room for 2002 solutions when it comes to your organization’s email security. In 2022, you need a modern approach and modern architecture to stop modern attacks.
Read More
Blog autotrain models cover
There are many approaches to ensuring our system can adapt quickly to new attack trends. One of the most successful approaches we’ve found is to take in the newest attacks and retrain our system end-to-end to detect them.
Read More
Blog isc credits cover
You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.
Read More
Blog fbi ic3 cover
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Read More
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.