The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.
Business email compromise (BEC) attacks have increased considerably over the past 6 months. Here’s how cybercriminals are changing their targets and tactics.
Threat actors are posing as businesses and individuals seeking tax preparation services and then providing copies of the Sorillus client remote access tool (RAT).
Hear how Lily Li, Product Designer at Abnormal, broke into the world of email security and learn how you can successfully start a role in a new industry.
There’s no room for 2002 solutions when it comes to your organization’s email security. In 2022, you need a modern approach and modern architecture to stop modern attacks.
There are many approaches to ensuring our system can adapt quickly to new attack trends. One of the most successful approaches we’ve found is to take in the newest attacks and retrain our system end-to-end to detect them.
You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
The new navigation involved a significant functional and visual overhaul of the user interface. It includes a refined user experience divided into three design themes.
To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks.
At Abnormal Security, our channel partners are critical to our continued rocket-ship growth and we’re delighted to recognize the impact they have on our mutual customers and on our mission to stop cybercrime.
The dedication to our customers from across the company, from engineering to sales, from marketing to customer success, ensures that when you work with Abnormal, you receive the best experience possible—while stopping all of the attacks that bypass other solution
Email password leaks happen after a compromised account or a data breach. A single password leak can jeopardize an entire database. You need to adhere to password best practices with a strong email security program.
At Abnormal, we're constantly innovating, and we're thrilled to share with you our major Q1 Winter product release, which includes enhanced detection for a variety of attack types, including business email compromise, account takeover, malware, and more.