About Threat Log

Understanding and analyzing the hundreds of email or texts organization sees a day consumes hours of time. To help, Abnormal Security offers Threat Log, a record of every malicious email flagged by our AI-based detection engine.

Video Transcript

Gabriel Rebane, Group Technical Marketing Manager

Attackers are constantly finding new ways to use email to infiltrate corporate networks and defraud employees. Security analysts are tasked with monitoring an organization's email traffic and implementing the right offense strategies to protect against these attacks. But understanding and analyzing the hundreds of email or text organization sees a day is a cumbersome task that consumes hours of time.

To help, Abnormal Security offers Threat Log a record of every malicious email flagged by our AI-based detection engine. Each attack description in Threat Log provides an in-depth analysis of the message and the signals that were used to determine that the message is dangerous. The AI-based algorithm understands when there are enough indicators to flag the email. Each attack description explains the anomalies related to identity, behavior, and content. Modern BEC attacks often bypass legacy SEG solutions because they do not contain traditional indicators of compromise.

Abnormal's unique approach uses natural language processing or NLP to interpret the content of each email, extracting signals related to tone and request type to determine the risk level of the message. Attackers often use either email spoofing or compromise accounts to conduct their attacks.

In response, Abnormal constantly analyzes signing signals, email patterns, communication habits, and thousands of additional data points to build a genome of the end user. Abnormal builds a relationship map of normal communication patterns, and anything that deviates from that known behavior helps inform the risk score of the message.

Threat log shows a detailed report of each email that is analyzed by abnormal increasing your understanding and giving you visibility into how each attack was carried out. It saves countless hours of laborious and manual analysis that otherwise would be executed by you or your team while helping you identify key banners that are shown as part of your security awareness training.

Want to know more? Request a demo today.

About Threat Log

See Abnormal in Action

Schedule a Demo

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Resources

Abnormal Landscape
See how Abnormal is working to make the cloud a safer place for business by protecting against all types of attacks across all types of cloud applications.
Watch Now
B TAG Cyber
Download the white paper to discover how to better secure your cloud email environment and choose the right security solutions provider.
Read More
New survey reveals the latest trends shaping communication and collaboration application security.
Read More
B 1500x1500 Choice Hotels Bright Talk Demo Day L1 R1
Discover how Choice Hotels is simplifying their email security, streamlining their operations, and preventing email attacks with the highest efficacy.
Watch Now
B 05 01 23 MKT279 New Slack Data Sheet
Secure your messages and keep Slack from becoming an entry point for attackers.
Read More
B 05 02 23 MKT283 New Zoom Solution Brief
Protect your Zoom collaboration and prevent attackers from using the application to breach your business.
Read More
B Email Like SPM
Monitor high-impact changes to user privileges across collaboration apps with Email-Like Security Posture Management.
Read More
B Email Like Messaging Security
Detect malicious message content across collaboration apps with Email-Like Messaging Security.
Read More
B Email Like ATO
Detect compromised user accounts across your critical communication channels with Email-Like Account Takeover Protection.
Read More