Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
This company has the best cybersecurity product I’ve ever seen, and we’re primed for a future where AI is the focus. Here’s my thoughts on why.
Join us for this series, featuring black hat hacker Kevin Poulsen and AI visionaries from OpenAI and CrowdStrike, presented by Fast Company.
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
It’s 2023 but not much has changed in phishing, as brand impersonation remains an attacker favorite.
In its first year, Email Productivity transformed employee productivity by removing promotional emails from inboxes. Discover our main takeaways, investments we've made in the product, and what to expect next.
As attackers leverage AI to improve their efforts, Osterman Research finds that organizations are prioritizing AI-enabled security to protect their email environments.
Abnormal crossed the $100M ARR threshold in only four years, but we’re not stopping there. Here’s our vision for the future of AI-powered cybersecurity.
Explore this glossary of need-to-know artificial intelligence terms to better understand AI and its uses.
Discover all of Abnormal's latest integrations across apps like Slack, Zoom, and Microsoft Teams extending your email-like protection across the cloud environment.
A secure email gateway (SEG) simply cannot defend your cloud email platform. Stop advanced threats with Abnormal Security. Here's what our customers have to say about ditching their SEGs.
Discover the top three reasons organizations should replace their traditional SEG with a modern solution to protect their cloud email environment from malicious actors and emerging threats.
See how Abuse Mailbox Automation provides organizations with an extra layer of security, helping security teams automate the user-reported phishing email workflow and identify malicious emails.
Third-party apps present increased cyberattack risks to email environments via app permissions. Traditional email can't handle the challenge, but Abnormal can.
Explore the evolution of an account takeover in the cloud email environment and discover how you can protect your organization from future compromise.
IBM's Cost of a Data Breach Report 2023 says the global average data breach cost in 2023 was $4.45 million. Protect yourself with Abnormal Security for cloud email.
Discover how one threat actor compromised five vendor organizations to commit the same invoice fraud attack against more than a dozen victims.
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Discover how an automated user-reported email workflow can improve productivity and better secure your cloud email environment.
Discover key cybersecurity takeaways from last week’s email breach on federal agencies by a Chinese APT group.
Discover how these security leaders modernized their security stack, saved time, and lowered security costs by replacing their SEG with Abnormal.
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Colleges, universities, and higher education facilities are hot targets for cybercriminals looking to steal personal data and intellectual property. Defend yourself.
Get AI Protection for Your Human Interactions
Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo
