chat
expand_more

Enhanced Explainability of Account Takeovers

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible...
March 20, 2021

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible, we're changing that starting today.

We have made significant improvements to the explainability of account takeover cases. Within the product, we added more information to the sign-in cards, including ISP and device trust type. We also highlight why sign-ins are suspicious to provide further information to those reviewing potential account compromises. In the example below, the IP address was very rare for the user and the company, and it is also a proxy, which attackers frequently use to hide their identities.

Additionally, we are surfacing our deep knowledge of sign-in characteristics. For example, analysts can now see the common states from which the user signs in, and what operating systems they typically use. This information can be extremely helpful in terms of judging a case.

Abnormal Security excels in its accuracy in detecting account takeover attacks. Just as importantly, we are on the cutting edge of machine learning explainability so that users can understand why we think an account takeover has occurred.

To learn more about our account takeover functionality, request a demo today.

Enhanced Explainability of Account Takeovers

See Abnormal in Action

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B FBI IC3 2024 Report Blog
The 2024 FBI IC3 Report confirms BEC remains a top cyber threat, driving billions in losses alongside crypto-enabled investment scams.
Read More
B Byte Dance Live Panel Blog
With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
Read More
B MKT849 Open graphs for Fed Ramp Authorization news Blog
Discover what Abnormal AI’s FedRAMP Moderate Authorization means for the public sector.
Read More
B 1500x1500 Open Graph Images AI Innovation Blog
Learn how Abnormal leverages the latest AI developer tools to slash engineering time and streamline internal operations.
Read More
B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More