chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Osterman Recap
Discover key insights from Osterman Research’s latest report on modernizing MFA to tackle rising identity threats.
Read More
B Transportation Industry Attack Trends Blog
Explore the latest attack trends in the transportation industry and learn how to defend against rising threats like phishing, BEC, and VEC.
Read More
B F1000 Manufacturer Replaces Proofpoint with Abnormal
A global industrial manufacturer enhanced its email security and operational efficiency by replacing its Proofpoint SEG with Abnormal.
Read More
B QR Code Phishing One Year Later Blog
Are QR code phishing attacks still a threat? Explore the latest trends in QR code phishing and how AI-powered solutions like Abnormal Security stop these sophisticated attacks.
Read More
B Customers AI
Learn from Abnormal customers about the challenges of AI-enhanced attacks and discover why they trust AI-driven security solutions to stay ahead of these evolving threats.
Read More
B AI Mbx Prompts
Discover how to unlock the full potential of the AI Security Mailbox with custom prompts designed to enhance your generative AI output.
Read More
B Protecting Microsoft Accounts Blog
Microsoft, with its vast user base, is a prime target for cybercriminals. Discover the top 5 attack strategies used to compromise its users and systems.
Read More
B Convergence S3 Announcement Blog
Join us for Season 3 of The Convergence of AI + Cybersecurity as we explore deepfakes, the evolving role of the SOC, and the intricacies of AI-native security.
Read More
B AISM Augmenting Customer Facing Product with AI Blog
Learn how Abnormal Security leverages large language models (LLMs) to enhance security awareness and automate SOC teams’ workflows with AI Security Mailbox.
Read More
B Education Targeted Attacks Blog
Cyberattacks on schools have surged, exposing 650K+ records in the last 60 days. As the school year begins, phishing is a key threat to students, teachers, and staff.
Read More
B Fed RAMP Announcement Blog
Abnormal is pursuing FedRAMP Moderate authorization, which enables us to empower federal agencies with AI-native email security against advanced cyber threats.
Read More
B Data to Detection Blog
Discover how Abnormal Security leverages AI and decision trees to extract signals, analyze context, and detect sophisticated email threats with high accuracy.
Read More
B H2 2024 BEC VEC Blog
Our H2 2024 Email Threat Report revealed the rates of business email compromise and vendor email compromise continue to increase. Learn more.
Read More
B AI for the Future Blog
AI is transforming cybersecurity, and Abnormal leads the way with AI-powered automation to defend against modern threats. Learn about our vision for the future.
Read More
B Email Productivity
Email Productivity now streamlines six million mailboxes by leveraging AI to identify and move promotional messages out of the inbox.
Read More
B Testing Gen AI Products
Learn how Abnormal Security leverages large language models (LLMs) thoughtfully with safeguards and GenAI-based quality assurance testing.
Read More
B H2 2024 Threat Report Blog
Released today, our H2 2024 Email Threat Report spotlights sophisticated phishing attacks that exploit file-sharing platforms. Learn more.
Read More
B Credential Price
Explore the ways in which corporate network access is valued by initial access brokers (IABs) according to access type, company revenue, and country tier.
Read More
B IBM Cost of a Data Breach Report 2024 Recap
IBM's Cost of a Data Breach Report 2024 revealed a continued rise in breach costs and emphasized the role of AI and automation in reducing expenses and recovery time.
Read More
B Building AI to Fight AI
As we announce a $250M Series D funding round, we’re excited to continue investing in our mission of protecting humans with AI.
Read More
B Product Recap
Discover our latest product and detection enhancements which span new integrations, enhanced insights into Abnormal, and a suite of detection improvements.
Read More
B How BEC Attacks Are Evolving in AI Era
Discover how to protect your business from sophisticated BEC attacks, including vendor email compromise, AI-generated scams, and email thread hijacking.
Read More
B Echo Spoof
Learn about the recent EchoSpoofing attack that exploited Proofpoint's relay servers and how Abnormal's AI-driven approach provides superior protection against brand impersonation and advanced phishing attacks.
Read More
B PFPT
Discover how Abnormal Security detected a sophisticated phishing attack that evaded both Proofpoint and DarkTrace, and learn how it outperforms traditional solutions in combating modern email threats.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo