chat
expand_more

B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B How BEC Attacks Are Evolving in AI Era
Discover how to protect your business from sophisticated BEC attacks, including vendor email compromise, AI-generated scams, and email thread hijacking.
Read More
B MKT498 Images for FBI IC3 2023 Report Blog
Explore the biggest takeaways from the 2023 FBI IC3 Report, including the steady increase in losses due to business email compromise (BEC).
Read More
B Threat Report BEC VEC Blog
Our H1 2024 Email Threat Report revealed significant year-over-year increases in both business email compromise and vendor email compromise. Learn more.
Read More
B Health Care
Email attacks like BEC against the healthcare industry are on the rise in 2023. Protect yourself with sophisticated cloud-native email security.
Read More
Fbi 50 billion bec cover
The FBI IC3 identified $51 billion in exposed losses due to business email compromise from 2013 to 2022—an increase from previous estimations.
Read More
B 6 2 23 cybercriminals
Businesses need to stay ahead of malicious apps, social engineering, and more to keep their emails safe.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More
B Most Costly BEC Attack Examples
Losses from business email compromise (BEC) attacks are consistently increasing. Here are 11 examples of the most costly BEC attacks from the past decade.
Read More
B Business Email Compromise Response
Knowing what to do after receiving a business email compromise attack is essential for preventing costly consequences. Learn how to respond to BEC attacks.
Read More
B SVB Closure Cybersecurity Threats
The Silicon Valley Bank (SVB) closure has created opportunities for threat actors to launch more convincing email attacks. Here's how to lower your risk.
Read More
B Common Social Engineering Attacks
Learn about the psychology behind social engineering attacks and the steps you can take to block these advanced email threats.
Read More
Blog fbi ic3 cover
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Read More
Blog dark keyboard
Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion in reported losses in 2020 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact...
Read More
Blog purple calendar
Abnormal Security recently detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 out-of-office replies as well as read receipts back to them. These tactics indicate attackers are using every available tool and loophole...
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo