chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Product
Discover Abnormal's major product developments in 2023 and how they help businesses stay ahead of evolving cybersecurity threats.
Read More
B Reasons to Attend Vision 2024 Blog
Register for Abnormal's cybersecurity conference to hear from Kevin O’Leary, Keren Elazari, and the Secret Service, and get a head start on your ISC2 CPE credits.
Read More
B 1500x1500 Top Blogs of 2023 Blog v01
As 2023 comes to a close, we wanted to take a look back and highlight the top 10 articles published by Abnormal this year.
Read More
B 12 20 23 MFA Bypass
As attackers learn how to bypass MFA, detecting and remediating compromised accounts is more important than ever. Here’s how Abnormal does it.
Read More
B 12 18 23 Gen AI
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
Read More
B Favorite Customer Quotes 2023
As we close out 2023, we're excited to share a collection of our favorite customer quotes. Learn why enterprises across the globe trust Abnormal.
Read More
MKT395z 4 B Announcing Vision 2024 Blog
Join industry leaders and innovators for insights, cutting-edge technologies, and a keynote by Kevin O'Leary at this cybersecurity conference.
Read More
B 1500x1500 MKT440a Bazarcall Attack Blog Graphics
Explore the intricacies of this BazarCall phishing attack that uses a Google Form for heightened authenticity.
Read More
B 1500x1500 MKT404c EPR Graphic for Google Workspace Blog
Abnormal now offers policy-free, adaptive graymail management, making it a compelling solution for Google users aiming to boost employee productivity.
Read More
B 2023 Cybersecurity Stats
Learn the biggest cybersecurity statistics of 2023—from the rise of gen AI to the staggering losses caused by BEC. Stay informed and protect your organization.
Read More
B SOC Prod 12 4 23
Discover how to increase SOC productivity in the new year with an AI-powered strategy.
Read More
B Disney Attack Blog
This Disney+ scam email uses brand impersonation and personalization to send a convincing fake subscription charge notice.
Read More
B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More
B 11 14 23 Product Recap
Abnormal product enhancements improve detection against quishing and MFA bypass in conjunction with deeper insights, visibility, and data correlation.
Read More
B 11 15 23 MKT426 Crowd Strike integration blog
Discover how a new data ingestion integration from Abnormal Security and CrowdStrike helps organizations protect their data more efficiently while providing comprehensive visibility.
Read More
B How Abnormal Trains LL Ms Improved Detection
Get an in-depth look at how Abnormal leverages the latest AI technologies to bolster our security capabilities, including fine-tuning our own large language models (LLMs).
Read More
B Bittrex Phishing Attack
Attackers capitalize on the Bittrex bankruptcy by targeting customers with a convincing credential phishing attack.
Read More
B 11 6 23 SEG
See why acquiring an API-enabled email security startup isn't enough to improve a secure email gateway's detection capabilities.
Read More
B SOCAI
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo