chat
expand_more

Enhanced Explainability of Account Takeovers

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible...
March 20, 2021

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible, we're changing that starting today.

We have made significant improvements to the explainability of account takeover cases. Within the product, we added more information to the sign-in cards, including ISP and device trust type. We also highlight why sign-ins are suspicious to provide further information to those reviewing potential account compromises. In the example below, the IP address was very rare for the user and the company, and it is also a proxy, which attackers frequently use to hide their identities.

Additionally, we are surfacing our deep knowledge of sign-in characteristics. For example, analysts can now see the common states from which the user signs in, and what operating systems they typically use. This information can be extremely helpful in terms of judging a case.

Abnormal Security excels in its accuracy in detecting account takeover attacks. Just as importantly, we are on the cutting edge of machine learning explainability so that users can understand why we think an account takeover has occurred.

To learn more about our account takeover functionality, request a demo today.

Enhanced Explainability of Account Takeovers

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More
B Gartner MQ 2024 Announcement Blog
Abnormal Security was named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms and positioned furthest for Completeness of Vision.
Read More
B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Offensive AI 12 16 24
Learn how AI is used in cybersecurity, what defensive AI vs. offensive AI means, and how to use defensive AI to combat offensive AI.
Read More
B Proofpoint Customer Story Blog 7
See how Abnormal's AI helped a Fortune 500 insurance provider detect 27,847 threats missed by Proofpoint and save 6,600+ hours in employee productivity.
Read More
B Cyberattack Forecast Emerging Threats Blog
Uncover the latest email threats and strategies to strengthen your cybersecurity and prepare for 2025.
Read More