See a Demo
Filter by category
VEC Attacks on Replay: Attackers Use the Same Message to Target Victims in Critical Infrastructure
July 26, 2023
Discover how one threat actor compromised five vendor organizations to commit the same invoice fraud attack against more than a dozen victims.
An Overview of Vendor Risks: Tips for Vendor Procurement and Security Assessments
June 1, 2023
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Bypassing SEGs with Invoice and Payment Fraud Email Attacks: Real-World Examples
March 14, 2023
Discover how Abnormal detects and remediates payment fraud and invoice email attacks that bypass secure email gateways (SEGs).
Real-World Examples of Employees Engaging with Email Attacks
February 17, 2023
Callie Hinman Baron
See just how convincing modern email attacks can be and how cybercriminals can leverage social engineering to trick employees with these two real attacks.
Abnormal Knowledge Bases: Using VendorBase to Prevent Vendor Email Compromise Attacks
December 21, 2022
Discover how Abnormal provides detailed risk assessments based on vendor email analysis with VendorBase.
The Rising Threat of Vendor Email Compromise: Webinar Recap
March 26, 2021
You’ll find similar characteristics in BEC that you will in VEC. A common trait of BEC is it does not contain malware or malicious URLs, and due to that technique, it is able to bypass conventional email security measures like SEGs. BEC relies...
See the Abnormal Solution to the Email Security Problem
Protect your organization from the full spectrum of email attacks with Abnormal.
See a Demo