Check out software engineer Sharon Lin’s medium blog on joining the Abnormal team. Read her full story below. This January, I joined Abnormal Security as a new grad Software Engineer. As you
For Office 365 customers, Abnormal now manually or automatically remediates account takeover attacks. When an attack is detected, we sign users out of active sessions and disable compromised accounts. Manual remediation is
The prolific attack on SolarWinds and their partner ecosystem will forever change how we view supply chain security and the role email communication plays in it. As the events and details surrounding
New Role-Based Access Control Functionality – Abnormal Security is introducing new functionality to our Role Based Access Controls. With this update we are introducing two new roles: Global Per-Product Access – this
Abnormal Security detected two new types of attacks where scammers are targeting victims by redirecting their own Microsoft 365 Out of Office replies as well as read receipts back to them. These
When Abnormal Security was founded, our engineering and data science teams were focused on solving the toughest – and most expensive – email security problem for enterprises: business email compromise (BEC).
Quick Summary: Platform: Office 365 Mailboxes: Between 10,000 and 15,000 Email Gateway: None Email Security Bypassed: Office 365 Victims: Internal Employees Payload: Office 365 App Technique: Brand Impersonation What was the attack?