chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B 04 08 22 Supply Chain
The risk of supply chain compromise (also known as vendor email compromise or VEC) continues to increase. Our latest research uncovered some startling statistics about these attacks.
Read More
B 04 07 22 Company Award
Abnormal is excited to be named a Great Place to Work and one of America’s Best Startup Employers, showcasing our incredible culture and people.
Read More
B 04 06 22 BEC threat report
Business email compromise (BEC) attacks have increased considerably over the past 6 months. Here’s how cybercriminals are changing their targets and tactics.
Read More
B 04 05 22 RAT
Threat actors are posing as businesses and individuals seeking tax preparation services and then providing copies of the Sorillus client remote access tool (RAT).
Read More
B 04 1 22 Sophisticated Lateral Phishing Email Attacks
See how the Abnormal platform has improved the effectiveness of lateral attack detection and how it stops the most advanced attacks.
Read More
B 03 31 22 Design for the Unknown
Hear how Lily Li, Product Designer at Abnormal, broke into the world of email security and learn how you can successfully start a role in a new industry.
Read More
Blog legacy seg ic3 cover
There’s no room for 2002 solutions when it comes to your organization’s email security. In 2022, you need a modern approach and modern architecture to stop modern attacks.
Read More
Blog autotrain models cover
There are many approaches to ensuring our system can adapt quickly to new attack trends. One of the most successful approaches we’ve found is to take in the newest attacks and retrain our system end-to-end to detect them.
Read More
Blog fbi ic3 cover
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Read More
Blog phone fraud cover
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
Read More
Blog model understanding cover
Here at Abnormal, our machine learning models help us spot trends and abnormalities in customer data in order to catch and prevent cyberattacks.
Read More
Blog new nav cover
The new navigation involved a significant functional and visual overhaul of the user interface. It includes a refined user experience divided into three design themes.
Read More
Blog mediterranian restaurant cover
To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks.
Read More
Blog bazarloaders cover
Actors are now exploiting the customer contact form on websites to bypass email security and encourage BazarLoader downloads.
Read More
Types of phishing blog cover
Phishing is one of the most common and costly cyberattacks in cybersecurity. But there isn't just one type of phishing attack.
Read More
Blog mrk partner coverpng
At Abnormal Security, our channel partners are critical to our continued rocket-ship growth and we’re delighted to recognize the impact they have on our mutual customers and on our mission to stop cybercrime.
Read More
Blog ransomware victims cover
Looking at the overall volume trends, there have been two main spikes in ransomware activity over the last two years.
Read More
Blog gartner cover
The dedication to our customers from across the company, from engineering to sales, from marketing to customer success, ensures that when you work with Abnormal, you receive the best experience possible—while stopping all of the attacks that bypass other solution
Read More
Blog esi podcast cover
The new podcast features exclusive interviews with Fortune 500 technology leaders about innovation in the enterprise.
Read More
Blog cover email password leak
Email password leaks happen after a compromised account or a data breach. A single password leak can jeopardize an entire database. You need to adhere to password best practices with a strong email security program.
Read More
Blog university students cover
Higher education institutions continue to be prime targets for attack as cybercrimianls prey on unsuspecting students.
Read More
Blog winter release cover
At Abnormal, we're constantly innovating, and we're thrilled to share with you our major Q1 Winter product release, which includes enhanced detection for a variety of attack types, including business email compromise, account takeover, malware, and more.
Read More
Blog driviing factors cover
As part of our research, we dove into why ransomware has changed and how each variable influences the overall threat of ransomware in distinctly different ways.
Read More
Most secure email blog cover
Keeping your email secure starts with picking a secure email provider, and major email providers can fall short.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo