Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Threat group Lilac Wolverine is fine-tuning the art of exploiting people’s willingness to help others in some of the largest gift card attacks we've seen.
Our Modern Email Attacks series has wrapped! Here are some of the biggest takeaways from Chris Krebs, Troy Hunt, and Theresa Payton.
See our commitment to providing our customers with the best possible solution and support with these reviews from Gartner® Peer Insights™.
Email Security Posture Management gives organizations insight into cloud configuration risks and gaps across user and app privileges.
Cloud email platforms enable better collaboration, but they also create new entry points, making sensitive data more accessible to attackers.
This post explores the continuation of the sharp decline in ransomware attacks as well as a few other notable data points from Q3 2022.
Learn the 7 key capabilities a cloud email security platform should have in order to address and resolve common email security challenges.
Discover the benefits of a modern, best-of-breed solution to email security with Abnormal Security and Valimail’s New Partnership.
Discover the latest trends in cybersecurity as we look toward the email threats of the future in partnership with SecureWorld.
Uncovering how threat group Crimson Kingsnake uses third-party impersonation tactics to swindle organizations across the world.
This quarter, Abnormal launched new features to help security teams enhance detection. Take a deep dive into all of the latest product updates.
From Fortune Best Workplace Awards to a game-changing new onboarding platform, it’s an exciting time to be a part of the Abnormal team.
This quarter, Abnormal launched new features to help security teams improve productivity and save time. Take a deep dive into all of the latest product enhancements.
Integrating email security with your other security tools can deliver significant benefits. See how security teams can leverage Abnormal integrations.
Allowing remote work improves engagement and retention, but it also increases your attack surface. Here’s how to protect your distributed workforce.
More effectively filter out spam with Abnormal’s enhanced AI detection models.
We are excited to share that Abnormal has recently deployed a BERT Large Language Model (LLM), pretrained from Google on a large corpus of data, and applied it to stop advanced attacks.
To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Get AI Protection for Your Human Interactions
Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo
![](https://img.plasmic.app/img-optimizer/v1/img?src=https%3A%2F%2Fimg.plasmic.app%2Fimg-optimizer%2Fv1%2Fimg%2F1620b1b4a7ef96a0cf0f5552dbf9d14c.png&q=75)