chat
expand_more

Q3 2022 Content Recap: 5 Blog Posts to Check Out

To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
October 7, 2022

As part of our mission to help enterprises protect their employees from the full spectrum of email attacks, we're committed to being a trusted source of data and insights for the cybersecurity community.

Our blog posts explore the latest trends, discuss emerging threats, and offer valuable advice—all to help ensure security professionals have the information they need to keep their organizations safe.

To that end, we wanted to make sure you have the opportunity to read the latest news and updates, which is why we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.

The 4 Most Damaging Types of Financial Supply Chain Compromise

Starting in January 2022 (and continuing every month since), threat actors have impersonated third parties more than internal employees in business email compromise (BEC) attacks. Understanding the ways cybercriminals execute these sophisticated BEC attacks is key to preventing your organization from falling victim to one. Learn more about the four subsets of financial supply chain compromise.

Blocking Phishing Attacks Before Employees Bite

Credential theft opens the door to more damaging and costly attacks, which means taking steps to block phishing emails must be a top priority in 2022. Phishing emails are designed to evade traditional email security solutions, and modern threat actors use a variety of tactics to make them as convincing as possible. Discover what you can do to protect your organization.

Understanding and Preventing Account Takeover Attacks

Account takeover attacks are both relatively easy to execute and incredibly difficult for secure email gateways (SEGs) to detect. And once an account has been compromised, it can lead to invoice fraud, data breaches, and more—making account takeover possibly the most dangerous email-based threat. Learn how threat actors compromise accounts and what you can do to reduce your risk.

3 Essential Elements of Effective Graymail Management

The standard approaches to managing unwanted mail that rely on static rules and policies, spam digests, and quarantine portals are neither practical nor scalable. And ignoring the issue will only lead to overflowing employee inboxes, wasted time, and lower productivity. Discover how innovative organizations use an API-driven, AI-based approach to limit time-wasting promotional emails.

5 Crucial Cybersecurity Tips for Retailers

Retailers are popular targets for sophisticated attacks like business email compromise, supply chain compromise, and account takeovers. In fact, retailers have an 81% chance of receiving a business email compromise attack each week. And between 2018 and 2022, socially-engineered attacks targeting retail organizations increased by 123%. Learn five essential measures retailers should adopt to reduce their vulnerability to email attacks.

Sign up for our blog newsletter to get the latest blog posts delivered right to your inbox. Just enter your email address in the dark green box on the right side of the page.

Q3 2022 Content Recap: 5 Blog Posts to Check Out

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More
B 2024 ISC2 Cybersecurity Workforce Study Recap
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Read More