Abstract Seafoam Joint

Launching Abnormal Intelligence to Provide Insight into Emerging Attacks

Introducing Abnormal Intelligence—your go-to resource for expert insights into emerging cyber threats and email attack trends.

August 10, 2022

Since our inception, Abnormal Security has been dedicated to one mission: fighting cybercrime. Our email security platform stops the socially-engineered and never-seen-before email attacks that evade traditional security solutions. Stopping everything from business email compromise to vendor fraud to ransomware, Abnormal is focused on protecting organizations worldwide from the most dangerous and financially-damaging attacks.

Still, we recognize that fighting cybercrime means more than simply providing software. With that in mind, we sought to provide a location where our customers and the larger community could turn for insight into new attacks, information about the latest trends in cybercrime, and actionable advice for how to stay one step ahead of cybercriminals.

Today, I’m thrilled to announce the launch of Abnormal Intelligence, a research and data hub focused on providing insight into new and emerging cyber threats. With new content published daily, we hope you’ll find this resource useful in understanding what types of attacks could be targeting your organization.

About Abnormal Intelligence

Being on the frontlines of the attack landscape offers us a unique perspective on evolving threats. We understand how these attacks are executed, why they bypass conventional technologies, and how to stop them. This platform was designed to ensure that you have access to this knowledge too—as soon as we know about it.

Abnormal Intelligence provides threat research and in-depth analysis that enables security teams to understand new trends in advanced email attacks including business email compromise, credential phishing, malware, and more. The community is designed to keep cybersecurity professionals informed of changes in the threat landscape so they can take the necessary steps to stop attacks before they target the organization. In the event an attack is successful, Abnormal Intelligence can offer advice on how to mitigate the damage.

What You’ll Find on Abnormal Intelligence

On the Abnormal Intelligence website, you’ll find:

  • Unique Attacks. See the most unique and interesting attacks uncovered by Abnormal, with full insight into how cloud email security solutions can stop them. We’ll post these daily, so check back often for more!

  • Threat Intel Research. Browse through a catalog of blog posts, white papers, and webinars to learn the latest about trends in the email threat landscape. While you’re there, check out our H2 2022 Email Threat Report released today, full of insight into the latest trends in brand impersonation, business email compromise, and more.

  • Attack Glossary. Get a full overview of each attack type shown in our Unique Attacks section, with answers to common questions about each.

Get Insight, Worry Less, and Sleep Better

Understanding the threat actors behind these emerging attacks and their current methodologies makes it easier to predict shifts in their strategies and adjust accordingly. With Abnormal Intelligence, you can discover new threats, research the latest tactics, and ensure you’re prepared with the information you need to better protect your organization.

Visit Abnormal Intelligence today and start learning how to keep your workforce safe from today’s biggest threats. And to have the most pertinent content delivered directly to your inbox, be sure to subscribe to our monthly newsletter—no marketing spam included, promise!


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More
B Overhauled Architecture Blog 08 29 22
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Read More