chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
Blog black curved lines
It’s common practice for companies to send notification emails with purchase receipts and tracking information, especially for purchases that are on the expensive side. However, for individuals who have not made recent purchases, this can be alarming, as...
Read More
Blog yellow tunnel
Vendor email compromise, in which a compromised vendor sends invoice or payment attacks to their customers, is growing in popularity. An easier to detect method of this attack happens when a vendor is impersonated, rather than compromised. In this attack, the...
Read More
Blog white bridge
We’ve seen an incredible uptick in collaboration software impersonations in the past month as the COVID-19 pandemic has forced people to work at home. Most of these attacks are associated with platforms like Google Workspace and Office 365, which can be...
Read More
Blog black white diagonals
Cybercriminals recently impersonated the US Navy Federal Credit Union with phishing emails to steal banking credentials.
Read More
Blog blue triangle water
Abnormal Security recently detected a phishing attempt that impersonated a DocuSign notification to steal user credentials.
Read More
Blog purple waves
Companies have largely transitioned to working from home where they can in response to the current pandemic and are relying on conferencing software such as Cisco WebEx. Attackers are taking advantage of this transition to impersonate collaboration and...
Read More
Blog green leaf pattern
We caught a recent phishing attack through a fake Microsoft Teams email designed to steal Office 365 login credentials.
Read More
Blog orange purple building
The work landscape is changing as employees move to working remotely because of COVID-19 shelter-in-place orders. As a result, people are switching from in-person meetings to online video conferencing software such as Zoom. In this attack, attackers pose as a...
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo