chat
expand_more

Abnormal Improves Email Attack Detection Efficacy by 20%

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
November 12, 2021

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.

Announcing Increased Email Attack Detection Efficacy

We are constantly improving our differentiated technology and superior efficacy when it comes to stopping email attacks. As a result, we have created and trained a new machine learning model that quickly eliminates identified false negatives, particularly for payloadless attacks like advanced socially-engineered emails and those attempting invoice or payment fraud. The new and improved model can rapidly be retrained to automatically identify novel attacks that evade traditional email solutions to provide our customers with the most effective email protection.

Our new model, now available in the Abnormal product, reduced the false-negative rate by a staggering 20%.

ML model improvement cycle reducing false-negatives by 20%

Continuous ML model improvement cycle.

The tremendous impact of reducing noise from incorrectly flagged email messages saves customers a tremendous amount of time while showing only the most relevant contextual information.

Protect Against Modern BEC and Social Engineering Attacks

In order to protect against modern social engineering attacks, IT security teams need to analyze a broader set of data in order to better understand the context of communications that is constantly learning and improving as bad actors adapt their tactics and techniques. Our full analysis is illustrated in the email content image.

Business Email Compromise sample email with Abnormal detection

This analysis allows customers to:

  • Perform identity modeling of both internal and external (partners, vendors, customers) entities, and analyze more data sources as a part of that modeling.

  • Create relationship graphs to understand, not only the strength of each connection and the frequency of communication, but also the content and tone of the communication.

  • Perform email content analysis using computer vision techniques, natural language processing, deep URL analysis, and threat intelligence.

Abnormal is committed to rapidly innovating to improve our detection capabilities, built-in automation, and processes to help security teams stay ahead of attackers. The updated algorithm brings these innovations, specifically those related to its detection improvements, to the forefront and provides a better experience for our customers.

Want to learn more about how our algorithms stop advanced attacks? Request a demo today.

Abnormal Improves Email Attack Detection Efficacy by 20%

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Osterman Recap
Discover key insights from Osterman Research’s latest report on modernizing MFA to tackle rising identity threats.
Read More
B Transportation Industry Attack Trends Blog
Explore the latest attack trends in the transportation industry and learn how to defend against rising threats like phishing, BEC, and VEC.
Read More
B F1000 Manufacturer Replaces Proofpoint with Abnormal
A global industrial manufacturer enhanced its email security and operational efficiency by replacing its Proofpoint SEG with Abnormal.
Read More
B QR Code Phishing One Year Later Blog
Are QR code phishing attacks still a threat? Explore the latest trends in QR code phishing and how AI-powered solutions like Abnormal Security stop these sophisticated attacks.
Read More
B Customers AI
Learn from Abnormal customers about the challenges of AI-enhanced attacks and discover why they trust AI-driven security solutions to stay ahead of these evolving threats.
Read More
B AI Mbx Prompts
Discover how to unlock the full potential of the AI Security Mailbox with custom prompts designed to enhance your generative AI output.
Read More