Q3 2022 Content Recap: 5 Blog Posts to Check Out

To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
October 7, 2022

As part of our mission to help enterprises protect their employees from the full spectrum of email attacks, we're committed to being a trusted source of data and insights for the cybersecurity community.

Our blog posts explore the latest trends, discuss emerging threats, and offer valuable advice—all to help ensure security professionals have the information they need to keep their organizations safe.

To that end, we wanted to make sure you have the opportunity to read the latest news and updates, which is why we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.

The 4 Most Damaging Types of Financial Supply Chain Compromise

Starting in January 2022 (and continuing every month since), threat actors have impersonated third parties more than internal employees in business email compromise (BEC) attacks. Understanding the ways cybercriminals execute these sophisticated BEC attacks is key to preventing your organization from falling victim to one. Learn more about the four subsets of financial supply chain compromise.

Blocking Phishing Attacks Before Employees Bite

Credential theft opens the door to more damaging and costly attacks, which means taking steps to block phishing emails must be a top priority in 2022. Phishing emails are designed to evade traditional email security solutions, and modern threat actors use a variety of tactics to make them as convincing as possible. Discover what you can do to protect your organization.

Understanding and Preventing Account Takeover Attacks

Account takeover attacks are both relatively easy to execute and incredibly difficult for secure email gateways (SEGs) to detect. And once an account has been compromised, it can lead to invoice fraud, data breaches, and more—making account takeover possibly the most dangerous email-based threat. Learn how threat actors compromise accounts and what you can do to reduce your risk.

3 Essential Elements of Effective Graymail Management

The standard approaches to managing unwanted mail that rely on static rules and policies, spam digests, and quarantine portals are neither practical nor scalable. And ignoring the issue will only lead to overflowing employee inboxes, wasted time, and lower productivity. Discover how innovative organizations use an API-driven, AI-based approach to limit time-wasting promotional emails.

5 Crucial Cybersecurity Tips for Retailers

Retailers are popular targets for sophisticated attacks like business email compromise, supply chain compromise, and account takeovers. In fact, retailers have an 81% chance of receiving a business email compromise attack each week. And between 2018 and 2022, socially-engineered attacks targeting retail organizations increased by 123%. Learn five essential measures retailers should adopt to reduce their vulnerability to email attacks.

Sign up for our blog newsletter to get the latest blog posts delivered right to your inbox. Just enter your email address in the dark green box on the right side of the page.

Q3 2022 Content Recap: 5 Blog Posts to Check Out

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

Integrates Insights Reporting 09 08 22

Related Posts

B travelscams
Cybercriminals exploit stolen financial data to offer consumers heavily discounted travel deals. Learn how these email scams work and tips to avoid falling victim to them this summer travel season.
Read More
B Earn Your CPE Credits with Abnormal
Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
Read More
B Seg Lessons
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Read More
B Europe Attack Data Blog
Discover what our research uncovered about the European threat landscape and attack trends for organizations in the region.
Read More
Abnormal aims to provide superior detection of email attacks while also directly and indirectly influencing the security awareness of your employees.
Read More
B 6 3 24 BEC Attacks
Discover how cybercriminals obtain corporate data from brokers like ZoomInfo and Apollo to enable targeted business email compromise (BEC) attacks.
Read More