chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Threat Hijacking Multi Persona Attacks Blog
Discover how threat actors are creating more sophisticated attacks utilizing lookalike domains and new personas, and learn how Abnormal can detect these attacks.
Read More
B Tax Related Email Scams
The impending arrival of Tax Day always brings a surge in email attacks aimed at exploiting the stress and anxiety associated with April 15.
Read More
B Chat GPT Jailbreak Blog Update
This article examines the top five ChatGPT jailbreak prompts that cybercriminals use to generate illicit content, including DAN, Development Mode, Translator Bot, AIM, and BISH.
Read More
B 1500x1500 Open Graph Images for Crowd Strike
Discover the biggest milestones achieved in the first year of the Abnormal and CrowdStrike partnership and how we are helping joint customers improve their security posture with AI-powered technology.
Read More
B Most Interesting Attacks Q1 2024
Take a look at five of the most unique and sophisticated email attacks recently detected and stopped by Abnormal.
Read More
B MKT499 Images for Customer Blog Series
Discover key industry trends and insights from cybersecurity leader Michael Marassa, CTO of New Trier Township High School District 203.
Read More
B Construction Professional Services QR Code Attacks
Abnormal data shows construction firms and professional service providers are up to 19.2 times and 18.5 times, respectively, more likely to receive QR code attacks than organizations in other industries.
Read More
B 1500x1500 Evolving Abnormal R2
From the beginning, we created Abnormal Security to be a generational company that protects people from cybercrime. Here’s how we’re doing it.
Read More
Blog Cover 1500x1500 Images for SOC Time Blog
Discover the critical tasks that occupy SOC analysts’ schedules beyond mere inbox management, and discover insights into optimizing efficiency in cybersecurity operations.
Read More
B 1500x1500 MKT494 Top Women in Cybersecurity
In honor of Women's History Month, we're spotlighting 10 women leaders who are making invaluable contributions to cybersecurity.
Read More
B 1 30 23 Microsoft ATO
A recent nation-state actor attack by the Russian-backed threat group Midnight Blizzard infiltrated Microsoft. Discover how Abnormal can protect you from account takeovers in real time.
Read More
B MKT498 Images for FBI IC3 2023 Report Blog
Explore the biggest takeaways from the 2023 FBI IC3 Report, including the steady increase in losses due to business email compromise (BEC).
Read More
B ISC2 Report 3 5 24
The latest report from ISC2 shares illuminating perspectives on how artificial intelligence (AI) is transforming the cybersecurity workforce.
Read More
B 1500x1500 CISO Chat GPT Recap Blog 03 04 24
In this Vision 2024 CISO panel recap, Mike Britton shares some of the biggest takeaways from his conversation with industry-leading CISOs.
Read More
B Skills 3 26 24
Discover the security risks associated with generative AI, machine learning, containerization, and microservices, and explore strategies to address the skills gap among cybersecurity professionals.
Read More
B 1500x1500 MKT481 Images for Convergence Season 2 Announcement Blog
Generative AI attacks and AI-powered security tools are changing the security landscape. Get the insights you need to know in our upcoming web series.
Read More
B 1500x1500 MKT477 Energy Infrastructure Data Blog
Energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. Learn more.
Read More
B Mr Wonderful Talks AI
Explore the future of AI and cybersecurity and learn why prioritizing security investments is crucial with Kevin O’Leary of Shark Tank fame.
Read More
B 1500x1500 MKT468a Open Graph Images for Phishing Subjects Blog
Discover the most engaging phishing email subjects, according to Abnormal data, and how to protect your organization from these scams.
Read More
B Threat Report BEC VEC Blog
Our H1 2024 Email Threat Report revealed significant year-over-year increases in both business email compromise and vendor email compromise. Learn more.
Read More
B 2 7 24 Product Update
Abnormal product enhancements improve detection efficacy, reporting on QR code attacks, productivity, and protection from account takeover.
Read More
B 1500x1500 Quishing Stats Blog 02 05 24
Today we released our H1 2024 Email Threat Report, which examines the threat landscape and dives into the latest evolution in phishing: QR code attacks.
Read More
B Look alike Domain Tactics
Learn 6 common look-alike domain tactics, some of the ways attackers use look-alike domains, and steps you can take to reduce your risk.
Read More
B 1 29 23 AI Love
Discover why Abnormal customers trust an AI-powered solution to protect their organizations from advanced email attacks.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo