Q2 2021: High-Profile Socially-Engineered Email Attacks Drive Record-High Employee Engagement & Fraud

Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement.

Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In our latest threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement with targets.

Download the threat report to learn about:

  • The rate of engagement with socially engineered attacks that bypass traditional email security
  • The dangers of lateral phishing attacks from compromised internal accounts
  • The growth in malicious mail filters, indicative of account takeovers, from Q4 2020 to Q1 2021
  • How the percentage of companies hit by vendor email compromise attacks has grown

Get the latest research on these highly dangerous attacks. Fill out the form to download the report today.

After reading this report, you are eligible for .5 CPE credits through (ISC)².

Q2 2021: High-Profile Socially-Engineered Email Attacks Drive Record-High Employee Engagement & Fraud

Download Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B Troy H Webinar 09 19 22
In this webinar, Abnormal CISO Mike Britton is joined by Troy Hunt, an expert in compromised credentials and the brains behind HaveIBeenPwned.com, to examine account takeover attacks.
Watch Now
B Account Takeover 08 22 22
Even one successful compromised account can start a cascade of other internal and external attacks, making it possibly the most dangerous email threat organizations face.
Download Now
Healthcare ato cover
For cybercriminals, penetrating a healthcare organization is like striking gold. Provider and payer professionals have access to some of the highest-value data in the world, including patients’ personal details, medical histories, social security numbers, insurance information, and more.
Watch Now