Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal
In order to be a strong partner to the cybersecurity community, Abnormal goes beyond simply providing solutions. In addition to creating technology that can block a wide variety of email attacks, we also continually produce content that offers security professionals the knowledge and guidance they need to protect their businesses from malicious actors.
Given the ever-changing nature of threats and the daily availability of new intelligence, we've been publishing quite a bit lately. To ensure you can review our most recent news and updates, here are a few of our audience-favorite posts from the last quarter that you may have missed.
This article examines how generative AI is being used by cybercriminals to create more sophisticated email attacks. Examples of these attacks include phishing emails, business email compromise (BEC) scams, vendor fraud, and more. Generative AI tools like ChatGPT and Google Bard can be used to create nearly flawless texts, making it difficult for the average person to spot the difference between a legitimate email and a malicious one. Continue Reading →
Everyone loves Slack, just ask their 20 million plus users (and counting). With Slack, you level the corporate playing field and build working relationships. It makes work more engaging, makes work-from-home feel less agoraphobic, and unlocks productivity. Unfortunately, threat actors also see chat platforms as prime targets. This article discusses the security risks associated with Slack and how Abnormal is helping organizations protect their Slack tenants from advanced threats with our new suite of Email-Like security products. Continue Reading →
The partnerships you form with vendors are essential for your business and brand, yet every business you collaborate with brings along its own set of risks. This article explores the risks associated with vendor relationships and how to protect organizations from Vendor Email Compromise (VEC) attacks. VEC attacks often go undetected as they use ‘real’ vendor email accounts and legitimate invoicing information. To protect against VEC, organizations should follow these key tips. Continue Reading →
Featuring industry leaders like Brian Krebs, Rachel Tobac, Dave Kennedy, Theresa Payton, Jessica Barker, FC (Freaky Clown), and more, this article offers unique insights on a range of topics related to cybersecurity, such as the latest updates, data security best practices, and tips for blocking socially-engineered attacks. Continue Reading →
The 2023 Verizon Data Breach Investigations Report reveals that Business Email Compromise (BEC) attacks have doubled over the past year, with attackers relying on stolen credentials and social engineering to gain access to confidential information and systems. This article details the key findings from the 2023 DBIR report including the primary methods used to gain access to organizations. Continue Reading →
ChatGPT and other generative AI tools are transforming productivity across countless applications, but they're not without risk. Unfortunately, they can also be weaponized by cybercriminals to create seemingly realistic phishing attacks and social engineering scams. During a recent live demonstration, ethical hacker and Cygenta CEO FC showcased how a hacker might use ChatGPT to write a convincing phishing email. This article offers a detailed recap of that demonstration. Continue Reading →
The occurrence of Business Email Compromise (BEC) attacks in Europe, which have seen a 7x increase in attacks in the period between June 2022 and May 2023, are surpassing the total number of attacks in the United States for the first time. The article explores the evolving cyber threat landscape in Europe and the most likely causes behind this recent spike in BEC attacks. Continue Reading →
Interested in learning more about the content we provide at Abnormal? Subscribe to our blog newsletter! Or schedule a demo today!