chat
expand_more

Q2 2022 in Review: Abnormal Moments You May Have Missed

We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
July 1, 2022

At Abnormal Security, we’re committed to being a valuable partner to the cybersecurity community. Along with providing technology that helps organizations protect their workforce from modern email attacks, we continually share content on the topics that matter most to security professionals. Our blog posts explore current trends, provide insights on the latest data, and offer actionable advice from industry experts.

With constantly evolving threats and new intelligence available almost daily, we’ve been publishing quite a bit lately. We want to make sure you have the opportunity to read all of the news and insights that can help you better safeguard your organization against advanced attacks.

Here are a handful of posts from the last few months we wanted to highlight.

Threat of Phishing In Line

According to the FBI, successful phishing attacks have increased by 34% in the last year, making it the most common email threat organizations face. On top of that, Abnormal data shows that 77% of all advanced email attacks contain a phishing link.

Phishing emails can open the door to more damaging and costly cybercrimes, which means it's critical to stop them before they reach employee inboxes. Learn why phishing emails are so dangerous and what you can do to stop them.

Read "Tackling the Increasing Threat of Phishing" >>

Blocking Advanced Attacks In Line

Secure email gateways (SEGs) were built to block traditional email attacks that contain known indicators of compromise within on-premises environments. But modern attacks don’t contain these traditional indicators, and more organizations adopt cloud-based email every day.

With high-impact email attacks on the rise, relying on a SEG could be doing more harm than good, providing your team with a false sense of security. See why SEGs can’t block advanced attacks in this webinar recap featuring Hunter Hogan from Microsoft.

Read "Blocking the Advanced Attacks Your SEG Never Could" >>

67 Chance of Supply Chain Compromise Attack In Line

In a supply chain compromise attack, a threat actor either uses a compromised vendor email account or impersonates an external third party to redirect the flow of company funds. Supply chain compromise attacks are specifically designed to bypass traditional email security and can cause substantial financial loss.

Our research uncovered some startling statistics about these email attacks and the growing risk they pose. Learn why these attacks represent a significant threat to organizations of all sizes.

Read "New Research Shows 67% Chance of Financial Supply Chain Compromise Attack" >>

Active Ransomware Groups In Line

Ransomware actors have proven that they're focused on one thing: making money in whatever way possible. Ransomware continues to be a significant threat vector across all industries and countries, and threat actors are targeting organizations with annual revenue as low as $8 million.

We took a close look at the ransomware ecosystem and analyzed some of the most high-profile groups of the past two years. Discover more about the 62 most prominent ransomware groups and their activities since January 2020.

Read "A Deep Dive into Active Ransomware Groups" >>

Stripe Credential Phishing In Line

While the core elements of most credential phishing attacks have stayed consistent throughout the 2000s, the ways modern cybercriminals approach creating phishing sites are becoming increasingly more elaborate.

In a recent attack, the threat actor leveraged a man-in-the-middle framework—capable of displaying live content and bypassing multifactor authentication—to recreate Stripe’s entire website to steal login credentials. See how it was executed and how Abnormal was able to stop it.

Read "Stripe Website Impersonated in Credential Phishing Attack" >>

Browse Our Library of Helpful Resources

In addition to our blog, we have a wealth of guides, white papers, on-demand webinars, and more available in our Resource Center—like our latest threat intelligence report, From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise.

Starting in January 2022, vendor impersonation outranked executive impersonation in business email compromise attacks, and that trend has continued each month since. Find out why this is the case (hint: you only have one CEO but hundreds of vendors!) and get insight into the four most common types we've noticed. Download the report now.


Sign up for our blog newsletter to get the latest posts delivered to your inbox. Just enter your email address in the dark green box on the right side of the page to subscribe.

Q2 2022 in Review: Abnormal Moments You May Have Missed

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More
B 2024 ISC2 Cybersecurity Workforce Study Recap
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Read More