Author jade hill

Jade Hill

Director of Content Marketing

Jade Hill is the Director of Content Marketing at Abnormal Security, where she runs strategic vision and execution of company-wide content marketing. She oversees the editorial process, manages contributors to the Abnormal Blog, and runs content programs for research reports, white papers, and more. Prior to joining Abnormal, she spent years in email security at Agari, and also worked in content at Facebook and BlueJeans Network. When not writing about advanced email threats, she spends her time biking on her Peloton, hanging out with her pets—Pumba, Timon, and Rafiki—and staying awake far too late reading thrillers.

Email spoofing cover
Email spoofing is a common form of phishing attack designed to make the recipient believe that the message originates from a trusted source. A spoofed email is more than just a nuisance—it’s a malicious communication that poses a significant security threat.
Read More
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More
Blog rising building
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Read More
Blog green computer
Phishing is the most common form of cyberattack in the world. Approximately 74% of organizations within the United States will experience a successful phishing attack at some point. Spear phishing, on the other hand, is a more targeted form of a phishing attack and is far more sinister.
Read More
Blog dark keyboard
Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion in reported losses in 2020 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact...
Read More