chat
expand_more

Threats, Trends, and Triumphs: Abnormal’s Top Blogs of 2024

Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
December 31, 2024

The past year has been transformative for the cybersecurity industry. Threat actors continued to innovate, leveraging tools like generative AI to carry out sophisticated attacks, while organizations adapted by investing in advanced AI-driven defenses. At Abnormal, we’ve been at the forefront of this fight, sharing insights and launching solutions to tackle these evolving threats.

To help you stay ahead, we’ve rounded up our top 10 blog posts of the year—each offering a deep dive into critical cybersecurity topics and trends.

With new cyber threats emerging almost daily, staying up to date on the latest cybersecurity trends, news, and best practices can be challenging. To help make it easier, sign up for our newsletter to get the latest Abnormal blog posts delivered right to your inbox.

Sign up for Abnormal Insights

1. 5 ChatGPT Jailbreak Prompts Being Used by Cybercriminals

Cybercriminals are exploiting ChatGPT’s safeguards through creative jailbreak prompts, bypassing restrictions to create malicious code, phishing templates, and social engineering scripts. Specific examples highlight the risks these techniques pose and outline strategies for organizations to monitor and mitigate the misuse of AI.

Jailbreak5

An example of the Development Mode prompt being shared on a cybercrime forum.

2. Cybercriminals Exploit Docusign with Customizable Phishing Templates

Threat actors have weaponized trusted platforms like Docusign by creating highly believable, customizable phishing templates. These attacks deceive users into revealing sensitive information. Detailed examples and actionable steps to improve email security make this essential reading for protecting against such threats.

Docusign2

A Docusign phishing template being shared on a cybercrime forum.

3. Expanding the Abnormal AI Platform: Protecting People Beyond Email

In 2024, Abnormal expanded its AI-driven protection to safeguard businesses across multiple communication channels, including chat applications and collaboration tools. Part of this expansion included the launch of a number of exciting new products, including the AI Security Mailbox—a transformational AI upgrade to our former Abuse Mailbox Automation product. Learn how this evolution is reshaping how organizations defend against modern cyber threats.

Screenshot 2024 12 31 at 12 35 39 PM

AI Security Mailbox completely automates your user-reported email workflow while engaging and delighting employees with conversational AI-powered responses.

4. 15 Cybersecurity Influencers to Follow This Year

Keeping up with the fast-paced world of cybersecurity is no small feat, but these 15 influencers are here to help. From visionary thought leaders to hands-on technical experts, this carefully curated list spotlights individuals who are delivering actionable advice and invaluable insights into the ever-evolving landscape of cyber threats.

Cybersecurity Influencers Jessica Barker

As the co-founder of cybersecurity company Cygenta, Dr. Barker advances cybersecurity awareness, behavior, and culture in organizations around the world.

5. Evolving Abnormal from Scrappy AI Start-Up to Generational Public Company

Take a behind-the-scenes journey through Abnormal's transformation from an ambitious AI start-up to a trailblazer in AI-native cybersecurity. This blog delves into key milestones, pivotal challenges, and a forward-looking vision that underscores our unwavering commitment to innovation. By redefining industry standards, Abnormal continues to pave the way for lasting growth and leadership.

Abnormal CEO and Co-Founder Evan Reiser sits down with Asheem Chandna, Greylock Partner and Investor to talk about the email security landscape and how Abnormal continues to protect its customers.

6. Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top Targets

Evilginx, a sophisticated phishing framework, has emerged as a potent tool for bypassing multi-factor authentication (MFA), with platforms like Gmail, Outlook, and Yahoo among the primary targets. This blog dives into the tactics used in these campaigns and provides actionable mitigation strategies, including enhancing MFA practices and deploying advanced detection technologies to stay ahead of evolving threats.

Evilginx1

Illustration of an attack using Evilginx.

7. Abnormal's AI-Native Cybersecurity: Building AI to Fight AI

As cybercriminals increasingly harness AI to launch sophisticated attacks, Abnormal is meeting the challenge with AI-native solutions that fight fire with fire. Explore how behavioral AI is meticulously crafted to detect and neutralize even the most advanced and subtle threats, setting a new standard in proactive cybersecurity.

Abnormal CEO Evan Reiser talks with NYSE's Trinity Chavez about the future of cybersecurity in an increasingly AI-powered world.

8. Threat Report: BEC & VEC Attacks Show No Signs of Slowing

Business Email Compromise (BEC) and Vendor Email Compromise (VEC) attacks continue to challenge organizations worldwide. This comprehensive 2024 trend analysis highlights the resilience of these threats and provides actionable insights on proactive strategies companies can implement to reduce exposure and strengthen defenses.

BEC VEC Blog BEC Attacks by Org Size

Organizations with 50,000 employees or more have a nearly 100% chance of experiencing at least one BEC attack every week—the highest probability of any organization size.

9. Designed to Deceive: 6 Common Look-alike Domain Tactics

Cybercriminals use look-alike domains to impersonate legitimate websites and mislead unsuspecting victims. This blog unpacks six common tactics—from slight spelling alterations to cleverly crafted subdomains—revealing how these schemes operate and offering practical steps organizations can take to detect and block them effectively.

Screenshot 2024 12 31 at 12 07 06 PM

An example of how cybercriminals use Unicode characters to direct users to fraudulent pages.

10. What Happened to WormGPT and What Are Cybercriminals Using Now?

Once making waves as a malicious generative AI tool, WormGPT has since faded from the spotlight—but cybercriminals haven’t stopped innovating. This blog traces the evolution of AI-driven tools in the hands of attackers, uncovering the latest technologies they’re leveraging and exploring the implications for the future of cybersecurity

Screenshot 2024 12 31 at 12 05 58 PM

A discussion of skepticism regarding WormGPT variants.

Looking Ahead to 2025

The cybersecurity world is ever-changing, but one thing remains constant: Abnormal’s unwavering commitment to safeguarding organizations against evolving threats. As we approach 2025, we’re ready to tackle new challenges together, empowering you with the tools and knowledge needed to stay one step ahead.

Start the new year strong. Schedule a demo and see how Abnormal can help you protect more, spend less, and secure the future.

Threats, Trends, and Triumphs: Abnormal’s Top Blogs of 2024

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story Blog 9
Discover how Abnormal's AI reduced this Fortune 500 automotive retailer and transportation services provider's risk, detecting 5,699 attacks Proofpoint missed and saving 105 SOC hours monthly.
Read More
B Top10 Blogs
Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
Read More
B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More
B Gartner MQ 2024 Announcement Blog
Abnormal Security was named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms and positioned furthest for Completeness of Vision.
Read More
B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Offensive AI 12 16 24
Learn how AI is used in cybersecurity, what defensive AI vs. offensive AI means, and how to use defensive AI to combat offensive AI.
Read More