chat
expand_more

Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
July 6, 2023

In order to be a strong partner to the cybersecurity community, Abnormal goes beyond simply providing solutions. In addition to creating technology that can block a wide variety of email attacks, we also continually produce content that offers security professionals the knowledge and guidance they need to protect their businesses from malicious actors.

Given the ever-changing nature of threats and the daily availability of new intelligence, we've been publishing quite a bit lately. To ensure you can review our most recent news and updates, here are a few of our audience-favorite posts from the last quarter that you may have missed.

1. Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks

This article examines how generative AI is being used by cybercriminals to create more sophisticated email attacks. Examples of these attacks include phishing emails, business email compromise (BEC) scams, vendor fraud, and more. Generative AI tools like ChatGPT and Google Bard can be used to create nearly flawless texts, making it difficult for the average person to spot the difference between a legitimate email and a malicious one. Continue Reading →

2. Don’t Get Caught Slacking: How Abnormal Protects Slack From Advanced Threats

Everyone loves Slack, just ask their 20 million plus users (and counting). With Slack, you level the corporate playing field and build working relationships. It makes work more engaging, makes work-from-home feel less agoraphobic, and unlocks productivity. Unfortunately, threat actors also see chat platforms as prime targets. This article discusses the security risks associated with Slack and how Abnormal is helping organizations protect their Slack tenants from advanced threats with our new suite of Email-Like security products. Continue Reading →

3. An Overview of Vendor Risks: Tips for Vendor Procurement and Security Assessments

The partnerships you form with vendors are essential for your business and brand, yet every business you collaborate with brings along its own set of risks. This article explores the risks associated with vendor relationships and how to protect organizations from Vendor Email Compromise (VEC) attacks. VEC attacks often go undetected as they use ‘real’ vendor email accounts and legitimate invoicing information. To protect against VEC, organizations should follow these key tips. Continue Reading →

4. 14 Cybersecurity Influencers to Follow This Year

Featuring industry leaders like Brian Krebs, Rachel Tobac, Dave Kennedy, Theresa Payton, Jessica Barker, FC (Freaky Clown), and more, this article offers unique insights on a range of topics related to cybersecurity, such as the latest updates, data security best practices, and tips for blocking socially-engineered attacks. Continue Reading →

5. 2023 Verizon Data Breach Investigations Report Recap: Socially-Engineered BEC Attacks Doubled Over the Past Year

The 2023 Verizon Data Breach Investigations Report reveals that Business Email Compromise (BEC) attacks have doubled over the past year, with attackers relying on stolen credentials and social engineering to gain access to confidential information and systems. This article details the key findings from the 2023 DBIR report including the primary methods used to gain access to organizations. Continue Reading →

6. Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT

ChatGPT and other generative AI tools are transforming productivity across countless applications, but they're not without risk. Unfortunately, they can also be weaponized by cybercriminals to create seemingly realistic phishing attacks and social engineering scams. During a recent live demonstration, ethical hacker and Cygenta CEO FC showcased how a hacker might use ChatGPT to write a convincing phishing email. This article offers a detailed recap of that demonstration. Continue Reading →

7. Spotlighting BEC Attacks in Europe: A Region At Risk

The occurrence of Business Email Compromise (BEC) attacks in Europe, which have seen a 7x increase in attacks in the period between June 2022 and May 2023, are surpassing the total number of attacks in the United States for the first time. The article explores the evolving cyber threat landscape in Europe and the most likely causes behind this recent spike in BEC attacks. Continue Reading →

Interested in learning more about the content we provide at Abnormal? Subscribe to our blog newsletter! Or schedule a demo today!

Schedule a Demo
Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More
B Gartner MQ 2024 Announcement Blog
Abnormal Security was named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms and positioned furthest for Completeness of Vision.
Read More
B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Offensive AI 12 16 24
Learn how AI is used in cybersecurity, what defensive AI vs. offensive AI means, and how to use defensive AI to combat offensive AI.
Read More
B Proofpoint Customer Story Blog 7
See how Abnormal's AI helped a Fortune 500 insurance provider detect 27,847 threats missed by Proofpoint and save 6,600+ hours in employee productivity.
Read More
B Cyberattack Forecast Emerging Threats Blog
Uncover the latest email threats and strategies to strengthen your cybersecurity and prepare for 2025.
Read More