chat
expand_more

Abnormal Improves Email Attack Detection Efficacy by 20%

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
November 12, 2021

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.

Announcing Increased Email Attack Detection Efficacy

We are constantly improving our differentiated technology and superior efficacy when it comes to stopping email attacks. As a result, we have created and trained a new machine learning model that quickly eliminates identified false negatives, particularly for payloadless attacks like advanced socially-engineered emails and those attempting invoice or payment fraud. The new and improved model can rapidly be retrained to automatically identify novel attacks that evade traditional email solutions to provide our customers with the most effective email protection.

Our new model, now available in the Abnormal product, reduced the false-negative rate by a staggering 20%.

ML model improvement cycle reducing false-negatives by 20%

Continuous ML model improvement cycle.

The tremendous impact of reducing noise from incorrectly flagged email messages saves customers a tremendous amount of time while showing only the most relevant contextual information.

Protect Against Modern BEC and Social Engineering Attacks

In order to protect against modern social engineering attacks, IT security teams need to analyze a broader set of data in order to better understand the context of communications that is constantly learning and improving as bad actors adapt their tactics and techniques. Our full analysis is illustrated in the email content image.

Business Email Compromise sample email with Abnormal detection

This analysis allows customers to:

  • Perform identity modeling of both internal and external (partners, vendors, customers) entities, and analyze more data sources as a part of that modeling.

  • Create relationship graphs to understand, not only the strength of each connection and the frequency of communication, but also the content and tone of the communication.

  • Perform email content analysis using computer vision techniques, natural language processing, deep URL analysis, and threat intelligence.

Abnormal is committed to rapidly innovating to improve our detection capabilities, built-in automation, and processes to help security teams stay ahead of attackers. The updated algorithm brings these innovations, specifically those related to its detection improvements, to the forefront and provides a better experience for our customers.

Want to learn more about how our algorithms stop advanced attacks? Request a demo today.

Abnormal Improves Email Attack Detection Efficacy by 20%

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B travelscams
Cybercriminals exploit stolen financial data to offer consumers heavily discounted travel deals. Learn how these email scams work and tips to avoid falling victim to them this summer travel season.
Read More
B Earn Your CPE Credits with Abnormal
Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
Read More
B Seg Lessons
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Read More
B Europe Attack Data Blog
Discover what our research uncovered about the European threat landscape and attack trends for organizations in the region.
Read More
B SAT
Abnormal aims to provide superior detection of email attacks while also directly and indirectly influencing the security awareness of your employees.
Read More
B 6 3 24 BEC Attacks
Discover how cybercriminals obtain corporate data from brokers like ZoomInfo and Apollo to enable targeted business email compromise (BEC) attacks.
Read More