Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Featured Resources
New research reveals employees engage with vendor email compromise attacks 44% of the time. See which industries and roles are most vulnerable to this threat.
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Traditional secure email gateways once defined email security. Today, they’re struggling to catch the final—and most dangerous—1% of attacks.
Discover how Abnormal Security leverages AI tools like Cursor and Model Context Protocol (MCP) in production to accelerate development.
Explore key takeaways from Season 4 of Convergence, covering how malicious AI is reshaping cybercrime, why human behavior remains a core vulnerability, and what evolving AI policy means for defenders.
Today’s targeted cyber attacks are so formidable that legacy defences can’t stop them, and even savvy professionals are being fooled. These examples show how sophisticated they’ve become.
Email bombing turns trusted sources into a smokescreen, flooding inboxes to distract users and hide follow-up threats.
EvilPanel is a new phishing toolkit built on Evilginx that provides a full-featured web interface for launching MFA-bypassing attacks.
Discover why traditional security awareness training isn’t reducing human risk and how AI-driven, personalized training can transform SAT effectiveness in 2025.
What did RSAC 2025 reveal about the next wave of cyberthreats—and the AI-powered tools to stop them? Abnormal’s Field CISO shares her top takeaways.
Discover how Abnormal AI accelerates developer velocity with its secure, in-house Model Context Protocol (MCP), integrating tools like GitHub and Jira directly into local environments to streamline workflows without compromising security.
Discover the measurable ROI of replacing your SEG with Abnormal—from 91% faster incident response to $703K in productivity savings.
Tool bloat is an easy win for hackers and a major integration headache for overstretched security teams. Platformisation could be the antidote to cyber complexity, closing the coverage gaps while dramatically easing the management of multiple security tools.
Can generative AI be manipulated for cybercrime? Our research shows how attackers can bypass safeguards in today’s top AI tools.
Discover the latest AI-powered innovations from Abnormal, including Quarantine Release, Enterprise Remediation Settings, URL Rewriting, and Misdirected Email.
Discover how Abnormal’s AI Data Analyst turns complex email security data into instant reports, clear insights, and board-ready presentations—no manual effort needed.
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Abnormal's latest product release delivers AI agents for security awareness training and data reporting, plus multiple no-cost upgrades to our Inbound Email Security product.
Verizon's 2025 Data Breach Investigations Report reveals how attackers continue to exploit human behavior. Here’s what defenders need to know.
The 2024 FBI IC3 Report confirms BEC remains a top cyber threat, driving billions in losses alongside crypto-enabled investment scams.
With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
Discover what Abnormal AI’s FedRAMP Moderate Authorization means for the public sector.
Learn how Abnormal leverages the latest AI developer tools to slash engineering time and streamline internal operations.
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Discover How It All Works