Abnormal Blog
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Abnormal product enhancements improve detection against quishing and MFA bypass in conjunction with deeper insights, visibility, and data correlation.
Discover how a new data ingestion integration from Abnormal Security and CrowdStrike helps organizations protect their data more efficiently while providing comprehensive visibility.
Get an in-depth look at how Abnormal leverages the latest AI technologies to bolster our security capabilities, including fine-tuning our own large language models (LLMs).
Discover the risk of these image-based QR attacks and how Abnormal’s AI-native detection system protects you.
We're excited to share that we've integrated with GPT-4, a state-of-the-art LLM developed by OpenAI, to enhance the detection of sophisticated email attacks.
See how advanced attacks are able to bypass MFA and how you can protect your organization.
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
Discover all of Abnormal's latest integrations across apps like Slack, Zoom, and Microsoft Teams extending your email-like protection across the cloud environment.
A secure email gateway (SEG) simply cannot defend your cloud email platform. Stop advanced threats with Abnormal Security. Here's what our customers have to say about ditching their SEGs.
Discover the top three reasons organizations should replace their traditional SEG with a modern solution to protect their cloud email environment from malicious actors and emerging threats.
See how Abuse Mailbox Automation provides organizations with an extra layer of security, helping security teams automate the user-reported phishing email workflow and identify malicious emails.
Discover how an automated user-reported email workflow can improve productivity and better secure your cloud email environment.
Cloud office platforms like Microsoft 365 and Google Workspace need strong cybersecurity solutions. Shape your cloud email security strategy with these ten tips.
Discover how the Abnormal dashboard offers visibility into your email environment to better protect against potential threats.
Learn about the distinct functionalities of transport rule-based and API-based solutions to make informed decisions about your security architecture.
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Discover how Abnormal secures your Slack and keeps collaborative apps from becoming entry points for attackers.
Discover how new email-like protections detect threats and mitigate risk across connected collaborative applications.
Discover how new Abnormal capabilities allow your organization to experience improved security and better collaboration.
Our Head of Security Operations shares why being an Abnormal customer inspired him to become an Abnormal employee and explores the key differentiators of our cloud email security platform.
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
See the Abnormal Solution to the Email Security Problem
Protect your organization from the full spectrum of email attacks with Abnormal.
