chat
expand_more

Threats, Trends, and Triumphs: Abnormal’s Top Blogs of 2024

Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
December 31, 2024

The past year has been transformative for the cybersecurity industry. Threat actors continued to innovate, leveraging tools like generative AI to carry out sophisticated attacks, while organizations adapted by investing in advanced AI-driven defenses. At Abnormal, we’ve been at the forefront of this fight, sharing insights and launching solutions to tackle these evolving threats.

To help you stay ahead, we’ve rounded up our top 10 blog posts of the year—each offering a deep dive into critical cybersecurity topics and trends.

With new cyber threats emerging almost daily, staying up to date on the latest cybersecurity trends, news, and best practices can be challenging. To help make it easier, sign up for our newsletter to get the latest Abnormal blog posts delivered right to your inbox.

Sign up for Abnormal Insights

1. 5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals

Cybercriminals are exploiting ChatGPT’s safeguards through creative jailbreak prompts, bypassing restrictions to create malicious code, phishing templates, and social engineering scripts. Specific examples highlight the risks these techniques pose and outline strategies for organizations to monitor and mitigate the misuse of AI.

Jailbreak5

An example of the Development Mode prompt being shared on a cybercrime forum.

2. Cybercriminals Exploit Docusign with Customizable Phishing Templates

Threat actors have weaponized trusted platforms like Docusign by creating highly believable, customizable phishing templates. These attacks deceive users into revealing sensitive information. Detailed examples and actionable steps to improve email security make this essential reading for protecting against such threats.

Docusign2

A Docusign phishing template being shared on a cybercrime forum.

3. Expanding the Abnormal AI Platform: Protecting People Beyond Email

In 2024, Abnormal expanded its AI-driven protection to safeguard businesses across multiple communication channels, including chat applications and collaboration tools. Part of this expansion included the launch of a number of exciting new products, including the AI Security Mailbox—a transformational AI upgrade to our former Abuse Mailbox Automation product. Learn how this evolution is reshaping how organizations defend against modern cyber threats.

Screenshot 2024 12 31 at 12 35 39 PM

AI Security Mailbox completely automates your user-reported email workflow while engaging and delighting employees with conversational AI-powered responses.

4. 15 Cybersecurity Influencers to Follow This Year

Keeping up with the fast-paced world of cybersecurity is no small feat, but these 15 influencers are here to help. From visionary thought leaders to hands-on technical experts, this carefully curated list spotlights individuals who are delivering actionable advice and invaluable insights into the ever-evolving landscape of cyber threats.

Cybersecurity Influencers Jessica Barker

As the co-founder of cybersecurity company Cygenta, Dr. Barker advances cybersecurity awareness, behavior, and culture in organizations around the world.

5. Evolving Abnormal from Scrappy AI Start-Up to Generational Public Company

Take a behind-the-scenes journey through Abnormal's transformation from an ambitious AI start-up to a trailblazer in AI-native cybersecurity. This blog delves into key milestones, pivotal challenges, and a forward-looking vision that underscores our unwavering commitment to innovation. By redefining industry standards, Abnormal continues to pave the way for lasting growth and leadership.

Abnormal CEO and Co-Founder Evan Reiser sits down with Asheem Chandna, Greylock Partner and Investor to talk about the email security landscape and how Abnormal continues to protect its customers.

6. Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top Targets

Evilginx, a sophisticated phishing framework, has emerged as a potent tool for bypassing multi-factor authentication (MFA), with platforms like Gmail, Outlook, and Yahoo among the primary targets. This blog dives into the tactics used in these campaigns and provides actionable mitigation strategies, including enhancing MFA practices and deploying advanced detection technologies to stay ahead of evolving threats.

Evilginx1

Illustration of an attack using Evilginx.

7. Abnormal's AI-Native Cybersecurity: Building AI to Fight AI

As cybercriminals increasingly harness AI to launch sophisticated attacks, Abnormal is meeting the challenge with AI-native solutions that fight fire with fire. Explore how behavioral AI is meticulously crafted to detect and neutralize even the most advanced and subtle threats, setting a new standard in proactive cybersecurity.

Abnormal CEO Evan Reiser talks with NYSE's Trinity Chavez about the future of cybersecurity in an increasingly AI-powered world.

8. Threat Report: BEC & VEC Attacks Show No Signs of Slowing

Business Email Compromise (BEC) and Vendor Email Compromise (VEC) attacks continue to challenge organizations worldwide. This comprehensive 2024 trend analysis highlights the resilience of these threats and provides actionable insights on proactive strategies companies can implement to reduce exposure and strengthen defenses.

BEC VEC Blog BEC Attacks by Org Size

Organizations with 50,000 employees or more have a nearly 100% chance of experiencing at least one BEC attack every week—the highest probability of any organization size.

9. Designed to Deceive: 6 Common Look-alike Domain Tactics

Cybercriminals use look-alike domains to impersonate legitimate websites and mislead unsuspecting victims. This blog unpacks six common tactics—from slight spelling alterations to cleverly crafted subdomains—revealing how these schemes operate and offering practical steps organizations can take to detect and block them effectively.

Screenshot 2024 12 31 at 12 07 06 PM

An example of how cybercriminals use Unicode characters to direct users to fraudulent pages.

10. What Happened to WormGPT and What Are Cybercriminals Using Now?

Once making waves as a malicious generative AI tool, WormGPT has since faded from the spotlight—but cybercriminals haven’t stopped innovating. This blog traces the evolution of AI-driven tools in the hands of attackers, uncovering the latest technologies they’re leveraging and exploring the implications for the future of cybersecurity

Screenshot 2024 12 31 at 12 05 58 PM

A discussion of skepticism regarding WormGPT variants.

Looking Ahead to 2025

The cybersecurity world is ever-changing, but one thing remains constant: Abnormal’s unwavering commitment to safeguarding organizations against evolving threats. As we approach 2025, we’re ready to tackle new challenges together, empowering you with the tools and knowledge needed to stay one step ahead.

Start the new year strong. Schedule a demo and see how Abnormal can help you protect more, spend less, and secure the future.

Threats, Trends, and Triumphs: Abnormal’s Top Blogs of 2024

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B ATO Arms Race
Discover how phishing-as-a-service (PhaaS) is transforming phishing attacks with cloud-based platforms, multi-factor authentication bypass, and session hijacking.
Read More
Blog MKT716p Open Graph Images for Gartner Blog
Explore the evolution of email security and discover insights from Gartner's Magic Quadrant on emerging threats and advanced defense strategies for organizations.
Read More
B Missed Attack Vendor Relationships
Discover how attackers exploit vendor relationships for credential phishing and how Abnormal Security’s AI-driven defense stops these attacks in real time, preventing account takeovers and minimizing risk.
Read More
B 1500x1500 MKT790 Deep Seek Open Graph Images
Cyber attackers may be using DeepSeek to create more email attacks. Worry less about AI-powered attacks with AI-powered protection from Abnormal Security.
Read More
ABN Innovate Blog 4 L1 R1
Did you miss Innovate 2025? Check out our major key takeaways from the conference, where we dive into how AI is transforming cyber threats, and cybersecurity, today.
Read More
B Proofpoint Customer Story Blog 11
See how Abnormal's AI helped a premium hospitality provider detect 1,366 threats missed by Proofpoint and save 766 hours/month in employee productivity.
Read More