Threats, Trends, and Triumphs: Abnormal’s Top Blogs of 2024
The past year has been transformative for the cybersecurity industry. Threat actors continued to innovate, leveraging tools like generative AI to carry out sophisticated attacks, while organizations adapted by investing in advanced AI-driven defenses. At Abnormal, we’ve been at the forefront of this fight, sharing insights and launching solutions to tackle these evolving threats.
To help you stay ahead, we’ve rounded up our top 10 blog posts of the year—each offering a deep dive into critical cybersecurity topics and trends.
With new cyber threats emerging almost daily, staying up to date on the latest cybersecurity trends, news, and best practices can be challenging. To help make it easier, sign up for our newsletter to get the latest Abnormal blog posts delivered right to your inbox.
1. 5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals
Cybercriminals are exploiting ChatGPT’s safeguards through creative jailbreak prompts, bypassing restrictions to create malicious code, phishing templates, and social engineering scripts. Specific examples highlight the risks these techniques pose and outline strategies for organizations to monitor and mitigate the misuse of AI.
2. Cybercriminals Exploit Docusign with Customizable Phishing Templates
Threat actors have weaponized trusted platforms like Docusign by creating highly believable, customizable phishing templates. These attacks deceive users into revealing sensitive information. Detailed examples and actionable steps to improve email security make this essential reading for protecting against such threats.
3. Expanding the Abnormal AI Platform: Protecting People Beyond Email
In 2024, Abnormal expanded its AI-driven protection to safeguard businesses across multiple communication channels, including chat applications and collaboration tools. Part of this expansion included the launch of a number of exciting new products, including the AI Security Mailbox—a transformational AI upgrade to our former Abuse Mailbox Automation product. Learn how this evolution is reshaping how organizations defend against modern cyber threats.
4. 15 Cybersecurity Influencers to Follow This Year
Keeping up with the fast-paced world of cybersecurity is no small feat, but these 15 influencers are here to help. From visionary thought leaders to hands-on technical experts, this carefully curated list spotlights individuals who are delivering actionable advice and invaluable insights into the ever-evolving landscape of cyber threats.
5. Evolving Abnormal from Scrappy AI Start-Up to Generational Public Company
Take a behind-the-scenes journey through Abnormal's transformation from an ambitious AI start-up to a trailblazer in AI-native cybersecurity. This blog delves into key milestones, pivotal challenges, and a forward-looking vision that underscores our unwavering commitment to innovation. By redefining industry standards, Abnormal continues to pave the way for lasting growth and leadership.
Abnormal CEO and Co-Founder Evan Reiser sits down with Asheem Chandna, Greylock Partner and Investor to talk about the email security landscape and how Abnormal continues to protect its customers.
6. Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top Targets
Evilginx, a sophisticated phishing framework, has emerged as a potent tool for bypassing multi-factor authentication (MFA), with platforms like Gmail, Outlook, and Yahoo among the primary targets. This blog dives into the tactics used in these campaigns and provides actionable mitigation strategies, including enhancing MFA practices and deploying advanced detection technologies to stay ahead of evolving threats.
7. Abnormal's AI-Native Cybersecurity: Building AI to Fight AI
As cybercriminals increasingly harness AI to launch sophisticated attacks, Abnormal is meeting the challenge with AI-native solutions that fight fire with fire. Explore how behavioral AI is meticulously crafted to detect and neutralize even the most advanced and subtle threats, setting a new standard in proactive cybersecurity.
Abnormal CEO Evan Reiser talks with NYSE's Trinity Chavez about the future of cybersecurity in an increasingly AI-powered world.
8. Threat Report: BEC & VEC Attacks Show No Signs of Slowing
Business Email Compromise (BEC) and Vendor Email Compromise (VEC) attacks continue to challenge organizations worldwide. This comprehensive 2024 trend analysis highlights the resilience of these threats and provides actionable insights on proactive strategies companies can implement to reduce exposure and strengthen defenses.
9. Designed to Deceive: 6 Common Look-alike Domain Tactics
Cybercriminals use look-alike domains to impersonate legitimate websites and mislead unsuspecting victims. This blog unpacks six common tactics—from slight spelling alterations to cleverly crafted subdomains—revealing how these schemes operate and offering practical steps organizations can take to detect and block them effectively.
10. What Happened to WormGPT and What Are Cybercriminals Using Now?
Once making waves as a malicious generative AI tool, WormGPT has since faded from the spotlight—but cybercriminals haven’t stopped innovating. This blog traces the evolution of AI-driven tools in the hands of attackers, uncovering the latest technologies they’re leveraging and exploring the implications for the future of cybersecurity
Looking Ahead to 2025
The cybersecurity world is ever-changing, but one thing remains constant: Abnormal’s unwavering commitment to safeguarding organizations against evolving threats. As we approach 2025, we’re ready to tackle new challenges together, empowering you with the tools and knowledge needed to stay one step ahead.
Start the new year strong. Schedule a demo and see how Abnormal can help you protect more, spend less, and secure the future.