Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal
In order to be a strong partner to the cybersecurity community, Abnormal goes beyond simply providing solutions. In addition to creating technology that can block a wide variety of email attacks, we also continually produce content that offers security professionals the knowledge and guidance they need to protect their businesses from malicious actors.
Given the ever-changing nature of threats and the daily availability of new intelligence, we've been publishing quite a bit lately. To ensure you can review our most recent news and updates, here are a few of our audience-favorite posts from the last quarter that you may have missed.
1. Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks
This article examines how generative AI is being used by cybercriminals to create more sophisticated email attacks. Examples of these attacks include phishing emails, business email compromise (BEC) scams, vendor fraud, and more. Generative AI tools like ChatGPT and Google Bard can be used to create nearly flawless texts, making it difficult for the average person to spot the difference between a legitimate email and a malicious one. Continue Reading →
2. Don’t Get Caught Slacking: How Abnormal Protects Slack From Advanced Threats
Everyone loves Slack, just ask their 20 million plus users (and counting). With Slack, you level the corporate playing field and build working relationships. It makes work more engaging, makes work-from-home feel less agoraphobic, and unlocks productivity. Unfortunately, threat actors also see chat platforms as prime targets. This article discusses the security risks associated with Slack and how Abnormal is helping organizations protect their Slack tenants from advanced threats with our new suite of Email-Like security products. Continue Reading →
3. An Overview of Vendor Risks: Tips for Vendor Procurement and Security Assessments
The partnerships you form with vendors are essential for your business and brand, yet every business you collaborate with brings along its own set of risks. This article explores the risks associated with vendor relationships and how to protect organizations from Vendor Email Compromise (VEC) attacks. VEC attacks often go undetected as they use ‘real’ vendor email accounts and legitimate invoicing information. To protect against VEC, organizations should follow these key tips. Continue Reading →
4. 14 Cybersecurity Influencers to Follow This Year
Featuring industry leaders like Brian Krebs, Rachel Tobac, Dave Kennedy, Theresa Payton, Jessica Barker, FC (Freaky Clown), and more, this article offers unique insights on a range of topics related to cybersecurity, such as the latest updates, data security best practices, and tips for blocking socially-engineered attacks. Continue Reading →
The 2023 Verizon Data Breach Investigations Report reveals that Business Email Compromise (BEC) attacks have doubled over the past year, with attackers relying on stolen credentials and social engineering to gain access to confidential information and systems. This article details the key findings from the 2023 DBIR report including the primary methods used to gain access to organizations. Continue Reading →
6. Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT
ChatGPT and other generative AI tools are transforming productivity across countless applications, but they're not without risk. Unfortunately, they can also be weaponized by cybercriminals to create seemingly realistic phishing attacks and social engineering scams. During a recent live demonstration, ethical hacker and Cygenta CEO FC showcased how a hacker might use ChatGPT to write a convincing phishing email. This article offers a detailed recap of that demonstration. Continue Reading →
7. Spotlighting BEC Attacks in Europe: A Region At Risk
The occurrence of Business Email Compromise (BEC) attacks in Europe, which have seen a 7x increase in attacks in the period between June 2022 and May 2023, are surpassing the total number of attacks in the United States for the first time. The article explores the evolving cyber threat landscape in Europe and the most likely causes behind this recent spike in BEC attacks. Continue Reading →
Interested in learning more about the content we provide at Abnormal? Subscribe to our blog newsletter! Or schedule a demo today!