chat
expand_more

B Chat GPT Jailbreak Blog Update
This article examines the top five ChatGPT jailbreak prompts that cybercriminals use to generate illicit content, including DAN, Development Mode, Translator Bot, AIM, and BISH.
Read More
B ISC2 Report 3 5 24
The latest report from ISC2 shares illuminating perspectives on how artificial intelligence (AI) is transforming the cybersecurity workforce.
Read More
B 1500x1500 CISO Chat GPT Recap Blog 03 04 24
In this Vision 2024 CISO panel recap, Mike Britton shares some of the biggest takeaways from his conversation with industry-leading CISOs.
Read More
B Skills 3 26 24
Discover the security risks associated with generative AI, machine learning, containerization, and microservices, and explore strategies to address the skills gap among cybersecurity professionals.
Read More
B Mr Wonderful Talks AI
Explore the future of AI and cybersecurity and learn why prioritizing security investments is crucial with Kevin O’Leary of Shark Tank fame.
Read More
B 1 29 23 AI Love
Discover why Abnormal customers trust an AI-powered solution to protect their organizations from advanced email attacks.
Read More
B 12 18 23 Gen AI
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B SOCAI
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Read More
B How CIS Os Are Staying Ahead of Bad AI
Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
Read More
B Why CIS Os Invest AI Native Cybersecurity
Generative AI tools help bad actors craft sophisticated attacks in seconds. Learn why CISOs are investing in AI-native cybersecurity solutions to fight back.
Read More
B Power Generative AI Advanced Attacks
Learn how cybercriminals use AI for targeted social engineering attacks in this recap from Chapter 1 of our Convergence of AI + Cybersecurity series.
Read More
B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B Fraud GPT
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
Read More
B 8 15 23 Glossary
Explore this glossary of need-to-know artificial intelligence terms to better understand AI and its uses.
Read More
B 7 24 23 Worm GPT
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Read More
B 7 14 23 Gen A Ipng
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Read More
B 6 27 23 Chat Attacks
ChatGPT and other generative AI tools can be used to craft highly convincing phishing emails and social engineering scams. Here's how to spot them and fight back.
Read More
Gen AI blog cover
New attacks stopped by Abnormal show how attackers are using ChatGPT and similar tools to create more realistic and convincing email attacks.
Read More
B Chat GPT
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Read More
B Artificial Intelligence Address Email Threats
In part 3 of our 5-part series, Ed Amoroso discusses how artificial intelligence (AI) technology is particularly useful for reducing cyber risks to cloud email.
Read More
B 12 12 22 Chat GPT
Discover how ChatGPT can be used by threat actors to run business email compromise schemes and other email attacks.
Read More
 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22