chat
expand_more

Enhanced Explainability of Account Takeovers

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible...
March 20, 2021

To detect account takeovers, Abnormal Security’s machine learning algorithms utilize many factors related to location, devices, and applications. However, until now, much of that information was not exposed to users. In an effort to be as customer-centric as possible, we're changing that starting today.

We have made significant improvements to the explainability of account takeover cases. Within the product, we added more information to the sign-in cards, including ISP and device trust type. We also highlight why sign-ins are suspicious to provide further information to those reviewing potential account compromises. In the example below, the IP address was very rare for the user and the company, and it is also a proxy, which attackers frequently use to hide their identities.

Additionally, we are surfacing our deep knowledge of sign-in characteristics. For example, analysts can now see the common states from which the user signs in, and what operating systems they typically use. This information can be extremely helpful in terms of judging a case.

Abnormal Security excels in its accuracy in detecting account takeover attacks. Just as importantly, we are on the cutting edge of machine learning explainability so that users can understand why we think an account takeover has occurred.

To learn more about our account takeover functionality, request a demo today.

Enhanced Explainability of Account Takeovers

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Podcast Blog
Explore insights on AI, collaboration, career growth, and unforgettable stories from industry leaders shaping the future of cybersecurity.
Read More
B AI Vendor
Learn how to evaluate transparency, risks, scalability, and ethical considerations to make informed cybersecurity decisions.
Read More
B SOC Prod
Learn how AI-driven automation boosts SOC productivity by reducing false positives, addressing skills gaps, and enhancing threat detection. Discover strategies to future-proof your SOC and strengthen cybersecurity defenses.
Read More
B Proofpoint Customer Story F500 Insurance Provider
A Fortune 500 insurance provider blocked 6,454 missed attacks and saved 341 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B Malicious AI Platforms Blog
What happened to WormGPT? Discover how AI tools like WormGPT changed cybercrime, why they vanished, and what cybercriminals are using now.
Read More
B MKT748 Open Graph Images for Cyber Savvy 7
Explore insights from Brian Markham, CISO at EAB, as he discusses cybersecurity challenges, building trust in education, adapting to AI threats, and his goals for the future. Learn how he and his team are working to make education smarter while prioritizing data security.
Read More