Blog - Page 10 of 13 - Abnormal Security

Abnormal Security named to the Enterprise Tech 30

February 25, 2021

We are thrilled to be named to this year’s Enterprise Tech 30. At Abnormal Security, we are committed to delivering email security solutions that enterprises rely on to stop some of the most comprehensive and persistent attacks facing modern cloud

AWS Phishing

May 27, 2020

In this attack, attackers are impersonating a notification from Amazon Web Services in order to...

AT&T Impersonation Malware

May 21, 2020

In this attack, attackers impersonate a notification from AT&T in order to install malware on...

Vendor Impersonation Fraud

May 20, 2020

In this attack, the attacker is impersonating a known vendor in order to receive payment...

LogMeIn Phishing

May 19, 2020

In this attack, the attacker is impersonating the collaboration software provider, LogMeIn, in order to...

Navy Federal Credit Union Phishing

May 18, 2020

In this attack, attackers are impersonating the US Navy Federal Credit Union in order to...

What Abnormal Security’s Cool Vendor Recognition Says About the Email Security Market

May 11, 2020

Last week, we were proud to announce that Abnormal Security was named a Gartner Cool...

Zoom Phishing Campaign

May 11, 2020

In this attack, attackers are impersonating a notification from Zoom in order to steal Microsoft...

DocuSign Phishing

May 8, 2020

In this attack, attackers impersonate a notification from DocuSign in order to steal those credentials...

Cisco Webex Phishing

May 5, 2020

In this attack, attackers are impersonating a notification from Cisco Webex in order to steal...

Microsoft Teams Impersonation

May 1, 2020

Attackers have been impersonating notifications from Microsoft Teams in order to steal the credentials of...

Healthcare Refund Phishing

April 28, 2020

In this attack, attackers are impersonating a major healthcare company claiming the recipient is entitled...

IRS Impersonation

April 24, 2020

In this attack, attackers are impersonating the IRS claiming that they have the recipient’s financial...

Abnormal's Engineering Blog

Tales from Abnormal Engineering as we build the next generation of AI cyber security

Read Now