chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B PDF Annotations Mask Malicious QR Codes Blog
Attackers are exploiting PDF annotations to disguise phishing QR codes, bypassing security and deceiving users. Learn how this sophisticated threat works.
Read More
B BEC in the Age of AI
Business email compromise (BEC) has seen growth due to criminals adopting AI tools. See the trends and discover how to protect your business from cybercriminals.
Read More
Blog MKT716p Open Graph Images for Gartner Blog
Explore the evolution of email security and discover insights from Gartner's Magic Quadrant on emerging threats and advanced defense strategies for organizations.
Read More
B Ghost GPT Blog
Cybercriminals use GhostGPT, an uncensored AI chatbot, for malware creation, BEC scams, and more. Learn about the risks and how AI fights back.
Read More
B PDF Annotations Mask Malicious QR Codes Blog

Hiding in Plain Sight: How Attackers Use PDF Annotations to Mask Malicious QR Codes

B BEC in the Age of AI

BEC in the Age of AI: The Growing Threat

Blog MKT716p Open Graph Images for Gartner Blog

Email Security Evolution: What the Gartner® Magic Quadrant™ Tells Us About Tomorrow's Threats

B Ghost GPT Blog

How GhostGPT Empowers Cybercriminals with Uncensored AI

B Atlantis AIO Blog
Discover how cybercriminals use Atlantis AIO to automate credential stuffing attacks—and how AI-driven security can stop them before accounts are compromised.
Read More
B Black Basta
Black Basta is a highly active ransomware-as-a-service (RaaS) group that has been linked to dozens of high-profile attacks against organizations worldwide. See how they utilize generative AI to support their campaigns.
Read More
B AI Generated Zoom Impersonation Phishing Attack
Threat actors impersonated Zoom using an AI-generated phishing page to deliver a remote monitoring and management tool.
Read More
B Defensive AI
Discover how AI-driven defenses detect and prevent phishing, BEC scams, and supply chain attacks before they reach inboxes—protecting organizations from costly breaches.
Read More
B Design and Diagramming Tools Phishing Attack
Cybercriminals are exploiting trusted tools like Canva, Figma, and Lucidchart for phishing. Learn how these attacks work—and how to protect your business.
Read More
B Proofpoint Customer Story 14
A top insurance and benefits provider stopped 1,451 missed attacks and saved 150 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B Behav AI
Discover how behavioral AI detects and stops phishing and account compromise before they reach your users.
Read More
B AI Use Cases
AI is another tool to combat cybersecurity threats. We dive into common uses and challenges of AI in cybersecurity and how Abnormal Security can help.
Read More
B Nonprofit Attack Trends Blog
Advanced email attacks on nonprofits surged 35% year-over-year. Learn why cybercriminals are targeting the sector and how to stay protected.
Read More
B PDF Annotations Mask Malicious QR Codes Blog
Attackers are exploiting PDF annotations to disguise phishing QR codes, bypassing security and deceiving users. Learn how this sophisticated threat works.
Read More
B Phishing Attacks
Discover the most common types of phishing attacks and their impacts. Learn how cybercriminals exploit deception to compromise security and steal sensitive information.
Read More
B Proofpoint Customer Story Blog 13
Learn how a trusted fuel and convenience retailer blocked 2,300+ attacks missed by Proofpoint and reclaimed 300+ employee hours per month by adding Abnormal.
Read More
B BEC in the Age of AI
Business email compromise (BEC) has seen growth due to criminals adopting AI tools. See the trends and discover how to protect your business from cybercriminals.
Read More
B Phish Resistant
Discover how cybercriminals are adapting to phish-resistant authentication, using session hijacking, info-stealer malware, and consent phishing to bypass security controls.
Read More
B Fortune500
Discover why 20% of the Fortune 500 trust Abnormal Security’s behavioral AI to protect their people against advanced email threats.
Read More
ABN Innovate Blog 5 L1 R1
Uncover the future of AI-driven cybercrime in 2025. Our expert insights reveal how cybercriminals are leveraging AI to enhance their tactics and impact security.
Read More
B Fed Blog
Explore the role of AI in preventing nation-state email attacks, ensuring federal agencies are equipped to combat sophisticated cyber threats before they escalate.
Read More
B Crypto Grab Blog
CryptoGrab, a global cryptocurrency affiliate network, has been defrauding users of millions for more than 5 years using phishing emails and other tactics.
Read More
B Open Redirects
Explore the risks of open redirects and how they enable attackers to circumvent email security.
Read More
B Corrupted Word Doc QR Code Phishing Attack
Attackers exploit Microsoft Word’s file recovery to evade detection, using corrupted docs for QR code phishing. Learn how this tactic bypasses legacy security.
Read More
B H1 2025 Email Threat Report Blog
Explore new research on how AI is amplifying the impact of BEC and VEC attacks and learn how to defend against these evolving email security threats.
Read More
B Exploiting Google Services Blog
Cybercriminals misuse Google services for phishing, ad hijacking, and more. Learn five attack methods and how to protect your accounts.
Read More
B AI vs AI
Uncover the dangers of AI-driven scams. Our ethical hacker demonstrates real-time social engineering attacks, highlighting essential cybersecurity strategies for 2025.
Read More
B Misclassification Adaptation Blog
Learn how Abnormal Security minimizes false positives and false negatives with a multi-layered approach to cyberattack detection and email security.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo