Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
July 6, 2023

In order to be a strong partner to the cybersecurity community, Abnormal goes beyond simply providing solutions. In addition to creating technology that can block a wide variety of email attacks, we also continually produce content that offers security professionals the knowledge and guidance they need to protect their businesses from malicious actors.

Given the ever-changing nature of threats and the daily availability of new intelligence, we've been publishing quite a bit lately. To ensure you can review our most recent news and updates, here are a few of our audience-favorite posts from the last quarter that you may have missed.

1. Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks

This article examines how generative AI is being used by cybercriminals to create more sophisticated email attacks. Examples of these attacks include phishing emails, business email compromise (BEC) scams, vendor fraud, and more. Generative AI tools like ChatGPT and Google Bard can be used to create nearly flawless texts, making it difficult for the average person to spot the difference between a legitimate email and a malicious one. Continue Reading →

2. Don’t Get Caught Slacking: How Abnormal Protects Slack From Advanced Threats

Everyone loves Slack, just ask their 20 million plus users (and counting). With Slack, you level the corporate playing field and build working relationships. It makes work more engaging, makes work-from-home feel less agoraphobic, and unlocks productivity. Unfortunately, threat actors also see chat platforms as prime targets. This article discusses the security risks associated with Slack and how Abnormal is helping organizations protect their Slack tenants from advanced threats with our new suite of Email-Like security products. Continue Reading →

3. An Overview of Vendor Risks: Tips for Vendor Procurement and Security Assessments

The partnerships you form with vendors are essential for your business and brand, yet every business you collaborate with brings along its own set of risks. This article explores the risks associated with vendor relationships and how to protect organizations from Vendor Email Compromise (VEC) attacks. VEC attacks often go undetected as they use ‘real’ vendor email accounts and legitimate invoicing information. To protect against VEC, organizations should follow these key tips. Continue Reading →

4. 14 Cybersecurity Influencers to Follow This Year

Featuring industry leaders like Brian Krebs, Rachel Tobac, Dave Kennedy, Theresa Payton, Jessica Barker, FC (Freaky Clown), and more, this article offers unique insights on a range of topics related to cybersecurity, such as the latest updates, data security best practices, and tips for blocking socially-engineered attacks. Continue Reading →

5. 2023 Verizon Data Breach Investigations Report Recap: Socially-Engineered BEC Attacks Doubled Over the Past Year

The 2023 Verizon Data Breach Investigations Report reveals that Business Email Compromise (BEC) attacks have doubled over the past year, with attackers relying on stolen credentials and social engineering to gain access to confidential information and systems. This article details the key findings from the 2023 DBIR report including the primary methods used to gain access to organizations. Continue Reading →

6. Stopping Phishing Attacks and Socially-Engineered Threats from ChatGPT

ChatGPT and other generative AI tools are transforming productivity across countless applications, but they're not without risk. Unfortunately, they can also be weaponized by cybercriminals to create seemingly realistic phishing attacks and social engineering scams. During a recent live demonstration, ethical hacker and Cygenta CEO FC showcased how a hacker might use ChatGPT to write a convincing phishing email. This article offers a detailed recap of that demonstration. Continue Reading →

7. Spotlighting BEC Attacks in Europe: A Region At Risk

The occurrence of Business Email Compromise (BEC) attacks in Europe, which have seen a 7x increase in attacks in the period between June 2022 and May 2023, are surpassing the total number of attacks in the United States for the first time. The article explores the evolving cyber threat landscape in Europe and the most likely causes behind this recent spike in BEC attacks. Continue Reading →

Interested in learning more about the content we provide at Abnormal? Subscribe to our blog newsletter! Or schedule a demo today!

Schedule a Demo
Q2 2023 in Review: 7 Must-Read Blog Posts from Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More
Learn how Abnormal uses natural language processing or NLP to protect organizations from phishing, account takeovers, and more.
Read More
B DK Compromise 7 11 24
Discover the top five ways hackers compromise accounts, from exploiting leaked API credentials to SIM swapping partnerships, and more. Learn how these techniques enable account takeover (ATO) and pose risks to enterprises.
Read More
B Sans Recap 7 11 24
Discover trends among modern SOC teams, including misaligned budgets, increased automation, unsatisfactory AI tools, staffing issues, and more.
Read More