Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
July 6, 2023

In order to be a strong partner to the cybersecurity community, Abnormal goes beyond simply providing solutions. In addition to creating technology that can block a wide variety of email attacks, we also continually produce content that offers security professionals the knowledge and guidance they need to protect their businesses from malicious actors.

Given the ever-changing nature of threats and the daily availability of new intelligence, we've been publishing quite a bit lately. To ensure you can review our most recent news and updates, here are a few of our audience-favorite posts from the last quarter that you may have missed.

1. Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks

This article examines how generative AI is being used by cybercriminals to create more sophisticated email attacks. Examples of these attacks include phishing emails, business email compromise (BEC) scams, vendor fraud, and more. Generative AI tools like ChatGPT and Google Bard can be used to create nearly flawless texts, making it difficult for the average person to spot the difference between a legitimate email and a malicious one. Continue Reading →

2. Don’t Get Caught Slacking: How Abnormal Protects Slack From Advanced Threats

Everyone loves Slack, just ask their 20 million plus users (and counting). With Slack, you level the corporate playing field and build working relationships. It makes work more engaging, makes work-from-home feel less agoraphobic, and unlocks productivity. Unfortunately, threat actors also see chat platforms as prime targets. This article discusses the security risks associated with Slack and how Abnormal is helping organizations protect their Slack tenants from advanced threats with our new suite of Email-Like security products. Continue Reading →

3. An Overview of Vendor Risks: Tips for Vendor Procurement and Security Assessments

The partnerships you form with vendors are essential for your business and brand, yet every business you collaborate with brings along its own set of risks. This article explores the risks associated with vendor relationships and how to protect organizations from Vendor Email Compromise (VEC) attacks. VEC attacks often go undetected as they use ‘real’ vendor email accounts and legitimate invoicing information. To protect against VEC, organizations should follow these key tips. Continue Reading →

4. 14 Cybersecurity Influencers to Follow This Year

Featuring industry leaders like Brian Krebs, Rachel Tobac, Dave Kennedy, Theresa Payton, Jessica Barker, FC (Freaky Clown), and more, this article offers unique insights on a range of topics related to cybersecurity, such as the latest updates, data security best practices, and tips for blocking socially-engineered attacks. Continue Reading →

5. 2023 Verizon Data Breach Investigations Report Recap: Socially-Engineered BEC Attacks Doubled Over the Past Year

The 2023 Verizon Data Breach Investigations Report reveals that Business Email Compromise (BEC) attacks have doubled over the past year, with attackers relying on stolen credentials and social engineering to gain access to confidential information and systems. This article details the key findings from the 2023 DBIR report including the primary methods used to gain access to organizations. Continue Reading →

6. Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT

ChatGPT and other generative AI tools are transforming productivity across countless applications, but they're not without risk. Unfortunately, they can also be weaponized by cybercriminals to create seemingly realistic phishing attacks and social engineering scams. During a recent live demonstration, ethical hacker and Cygenta CEO FC showcased how a hacker might use ChatGPT to write a convincing phishing email. This article offers a detailed recap of that demonstration. Continue Reading →

7. Spotlighting BEC Attacks in Europe: A Region At Risk

The occurrence of Business Email Compromise (BEC) attacks in Europe, which have seen a 7x increase in attacks in the period between June 2022 and May 2023, are surpassing the total number of attacks in the United States for the first time. The article explores the evolving cyber threat landscape in Europe and the most likely causes behind this recent spike in BEC attacks. Continue Reading →

Interested in learning more about the content we provide at Abnormal? Subscribe to our blog newsletter! Or schedule a demo today!

Schedule a Demo
Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Posts

B Maximize Cybersecurity Awareness Month
It’s the 20th anniversary of Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats with these 5 tips.
Read More
B Health Care
Email attacks like BEC against the healthcare industry are on the rise in 2023. Protect yourself with sophisticated cloud-native email security.
Read More
B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Insights from Clemson University CISO
John Hoyt, CISO at Clemson University, shares his take on the unique cybersecurity challenges of higher education and how Abnormal Security can help.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B 9 12 23 ATO
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Read More