chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B 6 7 23 API
Learn about the distinct functionalities of transport rule-based and API-based solutions to make informed decisions about your security architecture.
Read More
Gen AI blog cover
New attacks stopped by Abnormal show how attackers are using ChatGPT and similar tools to create more realistic and convincing email attacks.
Read More
B 6 8 23 Collab
Business collaboration tools help employees with productivity and communication. But they can also present a number of cybersecurity risks for your business.
Read More
B Verizon
Discover the biggest takeaways about business email compromise and social engineering from the 2023 Verizon Data Breach Investigations Report (DBIR).
Read More
B 6 2 23 cybercriminals
Businesses need to stay ahead of malicious apps, social engineering, and more to keep their emails safe.
Read More
BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 30 23 Teams
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Read More
Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More
B Slack
Discover how Abnormal secures your Slack and keeps collaborative apps from becoming entry points for attackers.
Read More
ESG
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
Read More
B 5 10 23 Product
Discover how new email-like protections detect threats and mitigate risk across connected collaborative applications.
Read More
B 5 3 23 Detection
Discover how new Abnormal capabilities allow your organization to experience improved security and better collaboration.
Read More
B World Password Day
Happy World Password Day! Learn why good password hygiene is important for every employee and how to reduce the risk of account takeovers.
Read More
B 4 28 23 SE Gpng
Discover how real-world attackers abuse compromised personal email accounts to elicit response and realize financial and informational gain.
Read More
B Most Costly BEC Attack Examples
Losses from business email compromise (BEC) attacks are consistently increasing. Here are 11 examples of the most costly BEC attacks from the past decade.
Read More
B CISO Fireside Chat Recap
Hear what the CISOs at Abnormal Security, Wiz, Rubrik, and Noname Security have to say about the biggest security challenges modern organizations face.
Read More
B Third Party
Learn the risks behind third-party app integrations and permissions, and how posture management can help.
Read More
B Protecting Against Collaboration Apps
Discover more about collaboration app attacks and how to protect your organization from this emerging threat.
Read More
B Abnormal on Abnormal How We Use Our Platform
Our Head of Security Operations shares why being an Abnormal customer inspired him to become an Abnormal employee and explores the key differentiators of our cloud email security platform.
Read More
B Phishing is Your Biggest Cybersecurity Problem
Phishing attacks are a much larger issue than many organizations realize. Here are 5 reasons why you need to make preventing phishing a priority.
Read More
B Chat GPT
Discover the potential security risks of generative models like ChatGPT and how Abnormal keeps you protected.
Read More

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo