chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B 1500x1500 Cybersecurity Stats L2 R1
Discover some of the most significant cybersecurity statistics from 2022 and how your organization can minimize risk heading into the new year.
Read More
B 1500x1500 Holiday Threats Email L2 R1
Reduce your risk of a BEC or phishing attack this holiday season by watching out for these email threats.
Read More
B 1500x1500 Emerging Threats Webinar Recap L1 R1
Cybersecurity expert Ira Winkler discusses risks to cloud email and how to block both inbound email attacks and emerging threats.
Read More
B 1500x1500 Types of Email Platform Attacks L1 R2
Discover the most common types of email platform attacks in your cloud network and how you can prevent them.
Read More
B 1500x1500 Lilac Wolverine L1 R1
Threat group Lilac Wolverine is fine-tuning the art of exploiting people’s willingness to help others in some of the largest gift card attacks we've seen.
Read More
B 1500x1500 Modern Email Attacks Webinar Series L4 R2
Our Modern Email Attacks series has wrapped! Here are some of the biggest takeaways from Chris Krebs, Troy Hunt, and Theresa Payton.
Read More
B 1500x1500 Gartner Insights L1 R1
See our commitment to providing our customers with the best possible solution and support with these reviews from Gartner® Peer Insights™.
Read More
B 11 14 22 SPM Launch Blog Graphics
Email Security Posture Management gives organizations insight into cloud configuration risks and gaps across user and app privileges.
Read More
B 11 14 22 SPM Launch Blog 2
Cloud email platforms enable better collaboration, but they also create new entry points, making sensitive data more accessible to attackers.
Read More
B 1500x1500 Q3 Ransomeware L1 R2
This post explores the continuation of the sharp decline in ransomware attacks as well as a few other notable data points from Q3 2022.
Read More
B 10 05 22 Cloud Email Security Platform Essentials
Learn the 7 key capabilities a cloud email security platform should have in order to address and resolve common email security challenges.
Read More
B 11 07 22 Valimail
Discover the benefits of a modern, best-of-breed solution to email security with Abnormal Security and Valimail’s New Partnership.
Read More
B 11 07 22 Vision 23 Blog
Discover the latest trends in cybersecurity as we look toward the email threats of the future in partnership with SecureWorld.
Read More
B 1500x1500 Crimson Kingsnake L2 R1
Uncovering how threat group Crimson Kingsnake uses third-party impersonation tactics to swindle organizations across the world.
Read More
B 1500x1500 Detection Focus Recap L2 R1
This quarter, Abnormal launched new features to help security teams enhance detection. Take a deep dive into all of the latest product updates.
Read More
B 1500x1500 Culture Update L2 R1
From Fortune Best Workplace Awards to a game-changing new onboarding platform, it’s an exciting time to be a part of the Abnormal team.
Read More
B 1500x1500 Detection Enhancement Recap L2 R1 2x
This quarter, Abnormal launched new features to help security teams improve productivity and save time. Take a deep dive into all of the latest product enhancements.
Read More
B 10 19 22 Integration
Integrating email security with your other security tools can deliver significant benefits. See how security teams can leverage Abnormal integrations.
Read More
B 1500x1500 Distributed Workforce L3 R4
Allowing remote work improves engagement and retention, but it also increases your attack surface. Here’s how to protect your distributed workforce.
Read More
B Enhanced Spam Detection
More effectively filter out spam with Abnormal’s enhanced AI detection models.
Read More
B BERT
We are excited to share that Abnormal has recently deployed a BERT Large Language Model (LLM), pretrained from Google on a large corpus of data, and applied it to stop advanced attacks.
Read More
B 09 30 22 CISO Q3 2022 in Review
To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
Read More
B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo