chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More
B 11 14 23 Product Recap
Abnormal product enhancements improve detection against quishing and MFA bypass in conjunction with deeper insights, visibility, and data correlation.
Read More
B 11 15 23 MKT426 Crowd Strike integration blog
Discover how a new data ingestion integration from Abnormal Security and CrowdStrike helps organizations protect their data more efficiently while providing comprehensive visibility.
Read More
B How Abnormal Trains LL Ms Improved Detection
Get an in-depth look at how Abnormal leverages the latest AI technologies to bolster our security capabilities, including fine-tuning our own large language models (LLMs).
Read More
B Bittrex Phishing Attack
Attackers capitalize on the Bittrex bankruptcy by targeting customers with a convincing credential phishing attack.
Read More
B 11 6 23 SEG
See why acquiring an API-enabled email security startup isn't enough to improve a secure email gateway's detection capabilities.
Read More
B SOCAI
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Read More
B 1500x1500 MKT402a QR Code Detector Launch Blog Graphics
Discover the risk of these image-based QR attacks and how Abnormal’s AI-native detection system protects you.
Read More
B How CIS Os Are Staying Ahead of Bad AI
Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
Read More
B Detecting Attacks LL Ms
We're excited to share that we've integrated with GPT-4, a state-of-the-art LLM developed by OpenAI, to enhance the detection of sophisticated email attacks.
Read More
B Security Leaders Reacting to AI
To understand how organizations are responding to the evolving threat of AI, we surveyed 300 cybersecurity leaders. Here are a few key takeaways.
Read More
B Why CIS Os Invest AI Native Cybersecurity
Generative AI tools help bad actors craft sophisticated attacks in seconds. Learn why CISOs are investing in AI-native cybersecurity solutions to fight back.
Read More
B CISO Career Tips
Interested in charting a course toward becoming a CISO? Here are 12 tips to help you on your journey.
Read More
B 10 13 23 CAM Anomalies Top 5
Secure email gateways simply cannot block modern attacks. Here are the top 5 cyber threats bypassing your SEG.
Read More
B Two Decades of Email Attacks
See how cyber threats have evolved over the past two decades as we celebrate 20 years of Cybersecurity Awareness Month.
Read More
BC MFA
See how advanced attacks are able to bypass MFA and how you can protect your organization.
Read More
Valimail B
Discover how Abnormal and Valimail work together to provide customers with a comprehensive, well-integrated solution that protects their businesses from advanced attacks.
Read More
B Power Generative AI Advanced Attacks
Learn how cybercriminals use AI for targeted social engineering attacks in this recap from Chapter 1 of our Convergence of AI + Cybersecurity series.
Read More
B Must Know Email Attack Stats Cybersecurity Awareness Month
Stay secure by staying informed during the 20th anniversary of Cybersecurity Awareness Month. Explore 10 eye-opening statistics about advanced email attacks.
Read More
B Maximize Cybersecurity Awareness Month
It’s the 20th anniversary of Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats with these 5 tips.
Read More
 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22