chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Favorite Customer Quotes 2023
As we close out 2023, we're excited to share a collection of our favorite customer quotes. Learn why enterprises across the globe trust Abnormal.
Read More
MKT395z 4 B Announcing Vision 2024 Blog
Join industry leaders and innovators for insights, cutting-edge technologies, and a keynote by Kevin O'Leary at this cybersecurity conference.
Read More
B 1500x1500 MKT440a Bazarcall Attack Blog Graphics
Explore the intricacies of this BazarCall phishing attack that uses a Google Form for heightened authenticity.
Read More
B 1500x1500 MKT404c EPR Graphic for Google Workspace Blog
Abnormal now offers policy-free, adaptive graymail management, making it a compelling solution for Google users aiming to boost employee productivity.
Read More
B 2023 Cybersecurity Stats
Learn the biggest cybersecurity statistics of 2023—from the rise of gen AI to the staggering losses caused by BEC. Stay informed and protect your organization.
Read More
B SOC Prod 12 4 23
Discover how to increase SOC productivity in the new year with an AI-powered strategy.
Read More
B Disney Attack Blog
This Disney+ scam email uses brand impersonation and personalization to send a convincing fake subscription charge notice.
Read More
B 2024 Cybersecurity Predictions
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Read More
B 11 27 23 ATO Stats
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Read More
B Unmasking Vendor Fraud
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Read More
B ISC2
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Read More
B Good Bad Ugly Future of AI
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Read More
B Cryptocurrency Donations Attack
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Read More
B 11 14 23 Product Recap
Abnormal product enhancements improve detection against quishing and MFA bypass in conjunction with deeper insights, visibility, and data correlation.
Read More
B 11 15 23 MKT426 Crowd Strike integration blog
Discover how a new data ingestion integration from Abnormal Security and CrowdStrike helps organizations protect their data more efficiently while providing comprehensive visibility.
Read More
B How Abnormal Trains LL Ms Improved Detection
Get an in-depth look at how Abnormal leverages the latest AI technologies to bolster our security capabilities, including fine-tuning our own large language models (LLMs).
Read More
B Bittrex Phishing Attack
Attackers capitalize on the Bittrex bankruptcy by targeting customers with a convincing credential phishing attack.
Read More
B 11 6 23 SEG
See why acquiring an API-enabled email security startup isn't enough to improve a secure email gateway's detection capabilities.
Read More
B SOCAI
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Read More
B 1500x1500 MKT402a QR Code Detector Launch Blog Graphics
Discover the risk of these image-based QR attacks and how Abnormal’s AI-native detection system protects you.
Read More
B How CIS Os Are Staying Ahead of Bad AI
Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
Read More
B Detecting Attacks LL Ms
We're excited to share that we've integrated with GPT-4, a state-of-the-art LLM developed by OpenAI, to enhance the detection of sophisticated email attacks.
Read More
B Security Leaders Reacting to AI
To understand how organizations are responding to the evolving threat of AI, we surveyed 300 cybersecurity leaders. Here are a few key takeaways.
Read More
B Why CIS Os Invest AI Native Cybersecurity
Generative AI tools help bad actors craft sophisticated attacks in seconds. Learn why CISOs are investing in AI-native cybersecurity solutions to fight back.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo