Uncategorized - Abnormal Security

Subscribe to receive twice-monthly updates of the latest attacks we've detected in the wild:

Abnormal + Microsoft: Securing Email Together

Email security has always been about defense in depth and multiple solutions working well together. Traditionally, some customers have purchased Secure Email Gateways (SEGs) in addition to Microsoft Office 365 for added

Read more

ISMG Webinar Recap

Event Recap on The Rising Threat and Vendor Email Compromise In case you missed it, last week, Abnormal Security participated in the Information Security Media Group (ISMG) Webinar called “The Rising Threat

Read more

Enhanced Explainability of Account Takeovers

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. Until now, however, much of that information was not exposed to users. We have

Read more

Outgrowing your In-Memory DB and Scaling with Microservices

Abnormal Security’s Software Engineer Dhruv Purushottam wrote this medium post here. Read the full story below.

Read more

Abnormal Security’s Mission: Protect the internet

Check out the product team’s Eric Greenstein’s medium blog on our mission at Abnormal Security. Read the full post below. Our mission at Abnormal Security is to protect the internet. We will

Read more

The Real Threat of Vendor Email Compromise – Webinar Preview

Join us next week for the webinar, The Rising Threat of Vendor Email Compromise in a Post-SolarWinds Era. Why should you attend? Vendor email compromise is on the rise. These advanced attacks have

Read more

Joining Abnormal Security as a New Grad Software Engineer by Sharon Lin

Check out software engineer Sharon Lin’s medium blog on joining the Abnormal team. Read her full story below. This January, I joined Abnormal Security as a new grad Software Engineer. As you

Read more

What’s New: Week of Feb 15-19 – New Account Takeover Remediation Functionality

For Office 365 customers, Abnormal now manually or automatically remediates account takeover attacks. When an attack is detected, we sign users out of active sessions and disable compromised accounts.  Manual remediation is

Read more

An Inside Look at “The Rising Threat of Vendor Email Compromise in a Post-SolarWinds Era” Threat Research Report

The prolific attack on SolarWinds and their partner ecosystem will forever change how we view supply chain security and the role email communication plays in it. As the events and details surrounding

Read more

What’s New: Week of Jan 25-29 – New Role-Based Access Control Functionality

New Role-Based Access Control Functionality – Abnormal Security is introducing new functionality to our Role Based Access Controls. With this update we are introducing two new roles:  Global Per-Product Access – this

Read more

Scammers Target Microsoft 365 Read Receipt and Out of Office Reply Loophole for BEC Attacks

Abnormal Security detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 Out of Office replies as well as read receipts back to them. These

Read more

Abnormal + Microsoft Bring Together Complete Email Security

When Abnormal Security was founded, our engineering and data science teams were focused on solving the toughest – and most expensive – email security problem for enterprises: business email compromise (BEC).

Read more