chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Testing Gen AI Products
Learn how Abnormal Security leverages large language models (LLMs) thoughtfully with safeguards and GenAI-based quality assurance testing.
Read More
B H2 2024 Threat Report Blog
Released today, our H2 2024 Email Threat Report spotlights sophisticated phishing attacks that exploit file-sharing platforms. Learn more.
Read More
B Credential Price
Explore the ways in which corporate network access is valued by initial access brokers (IABs) according to access type, company revenue, and country tier.
Read More
B IBM Cost of a Data Breach Report 2024 Recap
IBM's Cost of a Data Breach Report 2024 revealed a continued rise in breach costs and emphasized the role of AI and automation in reducing expenses and recovery time.
Read More
B Building AI to Fight AI
As we announce a $250M Series D funding round, we’re excited to continue investing in our mission of protecting humans with AI.
Read More
B Product Recap
Discover our latest product and detection enhancements which span new integrations, enhanced insights into Abnormal, and a suite of detection improvements.
Read More
B How BEC Attacks Are Evolving in AI Era
Discover how to protect your business from sophisticated BEC attacks, including vendor email compromise, AI-generated scams, and email thread hijacking.
Read More
B Echo Spoof
Learn about the recent EchoSpoofing attack that exploited Proofpoint's relay servers and how Abnormal's AI-driven approach provides superior protection against brand impersonation and advanced phishing attacks.
Read More
B PFPT
Discover how Abnormal Security detected a sophisticated phishing attack that evaded both Proofpoint and DarkTrace, and learn how it outperforms traditional solutions in combating modern email threats.
Read More
B Writing Detection Rules with LL Ms Blog
Discover how Abnormal Security leverages large language models (LLMs) to automate and enhance email threat detection with AI-generated detection rules.
Read More
B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More
B NLP
Learn how Abnormal uses natural language processing or NLP to protect organizations from phishing, account takeovers, and more.
Read More
B DK Compromise 7 11 24
Discover the top five ways hackers compromise accounts, from exploiting leaked API credentials to SIM swapping partnerships, and more. Learn how these techniques enable account takeover (ATO) and pose risks to enterprises.
Read More
B Sans Recap 7 11 24
Discover trends among modern SOC teams, including misaligned budgets, increased automation, unsatisfactory AI tools, staffing issues, and more.
Read More
B State and Local Government Attack Trends
Advanced attacks targeting state and local governments are increasing. Discover what our research revealed about this alarming trend.
Read More
B CSA Report
Discover how industry experts view and are preparing for AI’s evolving role in cybersecurity.
Read More
B Examining Employee Engagement with Email Attacks
Cybercriminals know that humans are your enterprise's biggest vulnerability and are successfully engaging with your employees at an alarming rate.
Read More
B MBX
Explore how Abnormal’s AI Security Mailbox enhances cybersecurity by engaging and educating employees with personalized GenAI responses. Improve security awareness and streamline operations.
Read More
B Q2 2024 Attacks
In the second installment of our quarterly look-back at malicious emails, we examine 5 more recent noteworthy attacks detected and stopped by Abnormal.
Read More
B UPS Fed Ex Phishing Impersonation
Attackers attempt to steal payment information by posing as UPS and FedEx and sending fake shipment notifications about a pending delivery.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo