chat
expand_more

L Blog Author

Abnormal AI

Abnormal AI provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop socially-engineered and never-seen-before email attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, ransomware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation.

Blog Thumbnail

Artificial Intelligence

Vibe Hacking and AI-Enabled Threats: Lessons from Anthropic’s Report

Aug 29, 2025

/

6 min read

Blog Thumbnail

Threat Intel

Email as the Adversary Foothold: Lessons from Federal Cyber Breaches

Aug 28, 2025

/

7 min read

Blog Thumbnail

SOC

5 Critical Insights Driving Transformation in the Banking Sector

Aug 18, 2025

Blog Thumbnail

Threat Intel

The Dark Web Economy for Compromised Government and Police Email Accounts

Aug 14, 2025

/

6 min read

Blog Thumbnail

Threat Intel

SharePoint “ToolShell” Exploit: Guidance for CISOs

Jul 22, 2025

/

3 min read

Blog Thumbnail

Threat Intel

Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation Attacks

Jul 1, 2025

Blog Thumbnail

Threat Intel

Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout Hijacks

Jun 12, 2025

Blog Thumbnail

Threat Intel

EvilPanel: The New Face of Automated AiTM Phishing

May 15, 2025

Blog Thumbnail

Data & Trends

From Ineffective to Intelligent: Rethinking SAT with AI-Driven Insights

May 13, 2025

Blog Thumbnail

Product

By the Numbers: The Real ROI of Replacing a SEG with Abnormal

May 7, 2025

Blog Thumbnail

Threat Intel

ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time Monitoring

Apr 23, 2025

Blog Thumbnail

Threat Intel

Inside Pig Butchering: A Behavioral Breakdown of a Global Fraud Operation

Apr 15, 2025

Blog Thumbnail

Product

Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint Missed

Apr 11, 2025

Blog Thumbnail

Threat Intel

XFiles: A Fileless Malware Delivered via Phishing Campaigns

Apr 2, 2025

Blog Thumbnail

Product

Forging a Stronger Defense: Why a Global Industrial Manufacturer Added Abnormal to Block What Proofpoint Couldn’t

Mar 28, 2025

Blog Thumbnail

Threat Intel

Inside Atlantis AIO: Credential Stuffing Across 140+ Platforms

Mar 25, 2025

Blog Thumbnail

Threat Intel

Exploring Black Basta’s Use of Generative AI to Supercharge Cybercrime

Mar 24, 2025

Blog Thumbnail

Product

Underwriting a More Secure Future: How Abnormal Delivered What Proofpoint Couldn’t for a Top Insurance Provider

Mar 14, 2025

Blog Thumbnail

Product

Fueling Stronger Security: How Abnormal Filled Gaps Left by Proofpoint for a Leading Fuel and Convenience Retailer

Feb 28, 2025

Blog Thumbnail

Threat Intel

Multi-Layered Cryptocurrency Fraud: How CryptoGrab Drains Millions Through Scam Websites and Phishing

Feb 19, 2025

Blog Thumbnail

Threat Intel

Protect Your Google Accounts: 5 Ways Cybercriminals Exploit Google Services

Feb 11, 2025

Blog Thumbnail

Product

First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital System

Feb 5, 2025

Blog Thumbnail

Product

Luxury Secured: Why an Upscale Hotel and Resort Brand Trusted Abnormal to Succeed Where Proofpoint Fell Short

Jan 27, 2025

Blog Thumbnail

Threat Intel

How GhostGPT Empowers Cybercriminals with Uncensored AI

Jan 23, 2025

Blog Thumbnail

Product

A Better Route Forward: Why a Leading Travel Services Provider Chose Abnormal to Address Proofpoint’s Limitations

Jan 17, 2025

Blog Thumbnail

Threat Intel

How Threat Actors Weaponize Google Translate for Phishing

Jan 10, 2025

Blog Thumbnail

Product

Full Speed Ahead: Why a Fortune 500 Automotive Leader Trusted Abnormal to Fill Gaps Left by Proofpoint

Jan 3, 2025

Blog Thumbnail

Product

Driving Security Forward: Why a Fortune 500 Transportation Giant Found Proofpoint Lacking and Turned to Abnormal

Dec 20, 2024

Blog Thumbnail

Product

Raising the Bar: How Abnormal Delivered What Proofpoint Couldn’t for a Fortune 500 Insurance Leader

Dec 13, 2024

Blog Thumbnail

Threat Intel

How Phishing Kits Work: Unpacking Cybercriminal Tools in 2024

Dec 10, 2024

Blog Thumbnail

Product

When Proofpoint Fell Short: Why a Fortune 500 Insurance Provider Turned to Abnormal for Advanced Threat Detection

Dec 2, 2024

Blog Thumbnail

Threat Intel

What Happened to WormGPT and What Are Cybercriminals Using Now?

Nov 26, 2024

Blog Thumbnail

Product

255 Hours of SOC Productivity Reclaimed: Industrial Equipment Leader Chooses Abnormal Over Proofpoint

Nov 4, 2024

Blog Thumbnail

Product

159 High-Risk Vendor Accounts Detected: Multinational Healthcare Services Provider Reduces Supply Chain Risk by Replacing Proofpoint with Abnormal

Oct 25, 2024

Blog Thumbnail

Product

1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to Abnormal

Oct 14, 2024

Blog Thumbnail

Product

Saving 2,600+ Hours Per Month: Top Mortgage Lender Chooses Abnormal Over Proofpoint

Sep 30, 2024

Blog Thumbnail

Threat Intel

Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top Targets

Sep 19, 2024

Blog Thumbnail

Product

10X Better Protection: Fortune 1000 Manufacturer Replaces Proofpoint with Abnormal

Sep 11, 2024

Blog Thumbnail

Threat Intel

Protecting Your Microsoft Accounts: Understanding the Top 5 Cyberattack Tactics

Sep 4, 2024

Blog Thumbnail

Threat Intel

Education Sector Hit Hard: 650,000 Emails Exposed in Recent Cyberattacks

Aug 28, 2024

Blog Thumbnail

Threat Intel

The Price of Secrets: How Initial Access Brokers Value Corporate Access Credentials

Aug 13, 2024

Blog Thumbnail

Security Solutions

Attackers Exploit Proofpoint to Target Customers with Brand Impersonation Attacks

Jul 31, 2024

Blog Thumbnail

Threat Intel

French Companies Face Olympic-Sized Cyber Threats

Jul 23, 2024

Blog Thumbnail

Account Takeover

Cross-Platform Account Takeover: 4 Real-World Scenarios

Jul 22, 2024

Blog Thumbnail

Threat Intel

5 Unique Ways Hackers Compromise Accounts That Aren’t Phishing

Jul 15, 2024

Blog Thumbnail

Threat Intel

Cybercriminals Pose as Unofficial Travel Agents to Scam Consumers

Jun 18, 2024

Blog Thumbnail

Threat Intel

Cybercriminals Exploit B2B Lead Generation Tools for Business Email Compromise Attacks

Jun 5, 2024

Blog Thumbnail

Threat Intel

How Cybercriminals Attempt To Dodge Prosecution With Legal Disclaimers

May 21, 2024

Blog Thumbnail

Threat Intel

Cybercriminals Exploit Docusign with Customizable Phishing Templates

May 15, 2024

Blog Thumbnail

Threat Intel

SendGrid And Mailtrap Credentials Sold On Cybercrime Forums For Just $15

Apr 25, 2024