Abnormal Blog
Callie Hinman Baron
Content Marketing Manager
Callie Baron is the Content Marketing Manager at Abnormal Security, where she strengthens Abnormal's position as a thought leader by owning the creation and curation of resources exploring the latest attack types and trends, developments in the threat landscape, and the intersection of AI and cybersecurity.
She is a seasoned writer and content strategist with a decade of experience in B2B technology marketing. Callie is a proud graduate of the University of Texas (Hook 'em!) and is staunchly committed to following Ann Handley’s Rule of FIWTSBS—“Find Interesting Ways to Say Boring Stuff”.
Explore new research on how AI is amplifying the impact of BEC and VEC attacks and learn how to defend against these evolving email security threats.
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Our H2 2024 Email Threat Report revealed the rates of business email compromise and vendor email compromise continue to increase. Learn more.
Released today, our H2 2024 Email Threat Report spotlights sophisticated phishing attacks that exploit file-sharing platforms. Learn more.
IBM's Cost of a Data Breach Report 2024 revealed a continued rise in breach costs and emphasized the role of AI and automation in reducing expenses and recovery time.
Cybercriminals know that humans are your enterprise's biggest vulnerability and are successfully engaging with your employees at an alarming rate.
In the second installment of our quarterly look-back at malicious emails, we examine 5 more recent noteworthy attacks detected and stopped by Abnormal.
Discover what our research uncovered about the European threat landscape and attack trends for organizations in the region.
Verizon's 2024 Data Breach Investigations Report reveals the role of employees in creating opportunities for threat actors to infiltrate organizations.
Secure email gateways simply cannot block modern attacks. Here are the top eight cyber threats bypassing your SEG.
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
QR code phishing is the newest iteration of phishing. Learn about the latest malicious initiative designed to evade organizational security measures and manipulate targets.
Take a look at five of the most unique and sophisticated email attacks recently detected and stopped by Abnormal.
Abnormal data shows construction firms and professional service providers are up to 19.2 times and 18.5 times, respectively, more likely to receive QR code attacks than organizations in other industries.
Our H1 2024 Email Threat Report revealed significant year-over-year increases in both business email compromise and vendor email compromise. Learn more.
Today we released our H1 2024 Email Threat Report, which examines the threat landscape and dives into the latest evolution in phishing: QR code attacks.
As 2023 comes to a close, we wanted to take a look back and highlight the top 10 articles published by Abnormal this year.
Losses from business email compromise (BEC) attacks are consistently increasing. Here are 11 examples of the most costly BEC attacks from the past decade.
Phishing attacks are a much larger issue than many organizations realize. Here are 5 reasons why you need to make preventing phishing a priority.
We wanted to make sure that you have the opportunity to check out the most recent news and updates. Here are a few posts from the last quarter that you might have missed.
Knowing what to do after receiving a business email compromise attack is essential for preventing costly consequences. Learn how to respond to BEC attacks.
The Silicon Valley Bank (SVB) closure has created opportunities for threat actors to launch more convincing email attacks. Here's how to lower your risk.
Learn about the psychology behind social engineering attacks and the steps you can take to block these advanced email threats.
See just how convincing modern email attacks can be and how cybercriminals can leverage social engineering to trick employees with these two real attacks.
The H1 2023 Email Threat Report examines the email threat environment and focuses on the growing risk that employees pose to cybersecurity.
We’re already hard at work creating more helpful content for 2023, but first we wanted to highlight a few of our popular blog posts from the past year.
To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
This week, we released our H2 2022 Email Threat Report, which explores the latest email attack trends, including the rise of brand impersonation in phishing attacks.
We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
In this sophisticated credential phishing attack, the threat actor created a duplicate version of Stripe’s entire website.
While phishing emails have long been a popular way to steal Facebook login credentials, we’ve recently seen an increase in more sophisticated phishing attacks.