chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
Blog blue triangle water
Abnormal Security recently detected a phishing attempt that impersonated a DocuSign notification to steal user credentials.
Read More
Blog purple waves
Companies have largely transitioned to working from home where they can in response to the current pandemic and are relying on conferencing software such as Cisco WebEx. Attackers are taking advantage of this transition to impersonate collaboration and...
Read More
Blog green leaf pattern
We caught a recent phishing attack through a fake Microsoft Teams email designed to steal Office 365 login credentials.
Read More
Blog orange purple building
The work landscape is changing as employees move to working remotely because of COVID-19 shelter-in-place orders. As a result, people are switching from in-person meetings to online video conferencing software such as Zoom. In this attack, attackers pose as a...
Read More
Blog white side building
Cybercriminals are leveraging the uncertainty around the spread of COVID-19 as everyone focuses more on safety and security during these times. As markets crash, the attacker knows that people will look to p...
Read More
Blog circular lights
As the world is stuck inside, shipping items has increased and cybercriminals are taking notice. In a recent scam, attackers created an email to impersonate DHL and claimed that a package intended for the re...
Read More
Blog purple diagonals
Credential phishing attacks are not new, and impersonating Microsoft is well-known at this point. However, this attack is unique because the attacker was not simply asking for email credentials. Instead, the...
Read More
Blog green glass building
Executive impersonation is one of the most prevalent forms of business email compromise because it is typically easy to do. The attacker only needs to know the name and job type of a high-profile executive, ...
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo