Abnormal Blog
Discover the most engaging phishing email subjects, according to Abnormal data, and how to protect your organization from these scams.
Learn 6 common look-alike domain tactics, some of the ways attackers use look-alike domains, and steps you can take to reduce your risk.
It’s 2023 but not much has changed in phishing, as brand impersonation remains an attacker favorite.
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to phishing attacks.
Phishing attacks are a much larger issue than many organizations realize. Here are 5 reasons why you need to make preventing phishing a priority.
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Phishing is one of the most common and costly cyberattacks in cybersecurity. But there isn't just one type of phishing attack.
Email password leaks happen after a compromised account or a data breach. A single password leak can jeopardize an entire database. You need to adhere to password best practices with a strong email security program.
Phishing attacks are on the rise; the FBI reports that such attacks cost $52 million in 2022, and phishing has been the most common cybercrime reported to the IC3 since 2019. If you're one of the many people targeted by a phishing email, you're not alone.
The phishing email is one of the oldest and most successful types of cyberattacks. Attackers have long used phishing as a common attack vector to steal sensitive information or credentials from their victims. While most phishing emails are relatively simple to spot, the number of successful attacks has grown in recent years.
The threat actor behind the SolarWinds attack, the Russian-based Nobelium, has orchestrated another successful vendor email compromise attack, this time targeting the United States Agency for International Development (USAID). According to Microsoft’s...
As the details emerge on the ransomware attack that sent a major U.S. oil pipeline operated by Colonial Pipeline offline for a week, what we do know is that the likelihood the attack emerged from a malicious phishing email attack is extremely high. Earlier this week...
Cyber threats are constantly evolving. Cybersecurity teams are most effective when they deploy defenses that protect against the threats that pose the greatest risk at any given time. Socially-engineered attacks—one of the most financially damaging threats...
Get AI Protection for Your Human Interactions
Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo
![](https://img.plasmic.app/img-optimizer/v1/img?src=https%3A%2F%2Fimg.plasmic.app%2Fimg-optimizer%2Fv1%2Fimg%2F1620b1b4a7ef96a0cf0f5552dbf9d14c.png&q=75)