Q2 2021: High-Profile Socially-Engineered Email Attacks Drive Record-High Employee Engagement & Fraud

Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In our latest threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement with targets.

Download the threat report to learn about:

  • The rate of engagement with socially engineered attacks that bypass traditional email security
  • The dangers of lateral phishing attacks from compromised internal accounts
  • The growth in malicious mail filters, indicative of account takeovers, from Q4 2020 to Q1 2021
  • How the percentage of companies hit by vendor email compromise attacks has grown

Get the latest research on these highly dangerous attacks. Fill out the form to download the report today.

After reading this report, you are eligible for .5 CPE credits through (ISC)².

Download Now

Related Resources

B Troy H Webinar 09 19 22
In this webinar, Abnormal CISO Mike Britton is joined by Troy Hunt, an expert in compromised credentials and the brains behind HaveIBeenPwned.com, to examine account takeover attacks.
Watch Now
B Account Takeover 08 22 22
Even one successful compromised account can start a cascade of other internal and external attacks, making it possibly the most dangerous email threat organizations face.
Download Now
Healthcare ato cover
For cybercriminals, penetrating a healthcare organization is like striking gold. Provider and payer professionals have access to some of the highest-value data in the world, including patients’ personal details, medical histories, social security numbers, insurance information, and more.
Watch Now
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Download Now