Abnormal Blog
Jade Hill
Director of Content Marketing
Jade Hill is the Director of Content Marketing at Abnormal Security, where she runs strategic vision and execution of company-wide content marketing. She oversees the editorial process, manages contributors to the Abnormal Blog, and runs content programs for research reports, white papers, and more. Prior to joining Abnormal, she spent years in email security at Agari, and also worked in content at Facebook and BlueJeans Network. When not writing about advanced email threats, she spends her time biking on her Peloton, hanging out with her pets—Pumba, Timon, and Rafiki—and staying awake far too late reading thrillers.
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
World-renowned cybersecurity expert Dr. Eric Cole explores some of the common mistakes companies make when building security programs.
Learn why Abnormal customers love our comprehensive email security for Microsoft Office 365.
From Frank Abagnale to Rachel Tobac, our virtual conference was full of key insights about social engineering and more. Check them out here.
Cybersecurity expert Ira Winkler discusses risks to cloud email and how to block both inbound email attacks and emerging threats.
Discover the latest trends in cybersecurity as we look toward the email threats of the future in partnership with SecureWorld.
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Introducing Abnormal Intelligence—your go-to resource for expert insights into emerging cyber threats and email attack trends.
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Attending RSA Conference 2022? So is Abnormal! We’d love to see you at the event.
The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.
Business email compromise (BEC) attacks have increased considerably over the past 6 months. Here’s how cybercriminals are changing their targets and tactics.
You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
Phishing attacks are on the rise; the FBI reports that such attacks cost $52 million in 2022, and phishing has been the most common cybercrime reported to the IC3 since 2019. If you're one of the many people targeted by a phishing email, you're not alone.
The phishing email is one of the oldest and most successful types of cyberattacks. Attackers have long used phishing as a common attack vector to steal sensitive information or credentials from their victims. While most phishing emails are relatively simple to spot, the number of successful attacks has grown in recent years.
Before we jump into modern threats, I think it’s important to set the stage since email has been around. Since email existed, threat actors targeted email users with malicious messages, general spam, and different ways to take advantage of the platform. Then of course, more dangerous attacks started to come up… things like malware and other viruses.
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion in reported losses in 2020 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact...