chat
expand_more

B 12 18 23 Gen AI
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B SOCAI
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Read More
B How CIS Os Are Staying Ahead of Bad AI
Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
Read More
B Why CIS Os Invest AI Native Cybersecurity
Generative AI tools help bad actors craft sophisticated attacks in seconds. Learn why CISOs are investing in AI-native cybersecurity solutions to fight back.
Read More
B Power Generative AI Advanced Attacks
Learn how cybercriminals use AI for targeted social engineering attacks in this recap from Chapter 1 of our Convergence of AI + Cybersecurity series.
Read More
B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B Fraud GPT
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
Read More
B 8 15 23 Glossary
Explore this glossary of need-to-know artificial intelligence terms to better understand AI and its uses.
Read More
B 7 24 23 Worm GPT
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Read More
B 7 14 23 Gen A Ipng
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Read More
B 6 27 23 Chat Attacks
ChatGPT and other generative AI tools can be used to craft highly convincing phishing emails and social engineering scams. Here's how to spot them and fight back.
Read More
Gen AI blog cover
New attacks stopped by Abnormal show how attackers are using ChatGPT and similar tools to create more realistic and convincing email attacks.
Read More
B Chat GPT
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Read More
B Artificial Intelligence Address Email Threats
In part 3 of our 5-part series, Ed Amoroso discusses how artificial intelligence (AI) technology is particularly useful for reducing cyber risks to cloud email.
Read More
B 12 12 22 Chat GPT
Discover how ChatGPT can be used by threat actors to run business email compromise schemes and other email attacks.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo