Abnormal Blog/Author/Abnormal AI
Abnormal Blog/Author/Abnormal AI

Abnormal AI
Abnormal AI provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop socially-engineered and never-seen-before email attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, ransomware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation.

Artificial Intelligence
Vibe Hacking and AI-Enabled Threats: Lessons from Anthropic’s ReportAug 29, 2025
/
6 min read

Threat Intel
Email as the Adversary Foothold: Lessons from Federal Cyber BreachesAug 28, 2025
/
7 min read

SOC
5 Critical Insights Driving Transformation in the Banking SectorAug 18, 2025

Threat Intel
The Dark Web Economy for Compromised Government and Police Email AccountsAug 14, 2025
/
6 min read

Threat Intel
SharePoint “ToolShell” Exploit: Guidance for CISOsJul 22, 2025
/
3 min read

Threat Intel
Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation AttacksJul 1, 2025

Threat Intel
Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout HijacksJun 12, 2025

Threat Intel
EvilPanel: The New Face of Automated AiTM PhishingMay 15, 2025

Data & Trends
From Ineffective to Intelligent: Rethinking SAT with AI-Driven InsightsMay 13, 2025

Product
By the Numbers: The Real ROI of Replacing a SEG with AbnormalMay 7, 2025

Threat Intel
ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time MonitoringApr 23, 2025

Threat Intel
Inside Pig Butchering: A Behavioral Breakdown of a Global Fraud OperationApr 15, 2025

Product
Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint MissedApr 11, 2025

Threat Intel
XFiles: A Fileless Malware Delivered via Phishing CampaignsApr 2, 2025

Product
Forging a Stronger Defense: Why a Global Industrial Manufacturer Added Abnormal to Block What Proofpoint Couldn’tMar 28, 2025

Threat Intel
Inside Atlantis AIO: Credential Stuffing Across 140+ PlatformsMar 25, 2025

Threat Intel
Exploring Black Basta’s Use of Generative AI to Supercharge CybercrimeMar 24, 2025

Product
Underwriting a More Secure Future: How Abnormal Delivered What Proofpoint Couldn’t for a Top Insurance ProviderMar 14, 2025

Product
Fueling Stronger Security: How Abnormal Filled Gaps Left by Proofpoint for a Leading Fuel and Convenience RetailerFeb 28, 2025

Threat Intel
Multi-Layered Cryptocurrency Fraud: How CryptoGrab Drains Millions Through Scam Websites and PhishingFeb 19, 2025

Threat Intel
Protect Your Google Accounts: 5 Ways Cybercriminals Exploit Google ServicesFeb 11, 2025

Product
First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital SystemFeb 5, 2025

Product
Luxury Secured: Why an Upscale Hotel and Resort Brand Trusted Abnormal to Succeed Where Proofpoint Fell ShortJan 27, 2025

Threat Intel
How GhostGPT Empowers Cybercriminals with Uncensored AIJan 23, 2025

Product
A Better Route Forward: Why a Leading Travel Services Provider Chose Abnormal to Address Proofpoint’s LimitationsJan 17, 2025

Threat Intel
How Threat Actors Weaponize Google Translate for PhishingJan 10, 2025

Product
Full Speed Ahead: Why a Fortune 500 Automotive Leader Trusted Abnormal to Fill Gaps Left by ProofpointJan 3, 2025

Product
Driving Security Forward: Why a Fortune 500 Transportation Giant Found Proofpoint Lacking and Turned to AbnormalDec 20, 2024

Product
Raising the Bar: How Abnormal Delivered What Proofpoint Couldn’t for a Fortune 500 Insurance LeaderDec 13, 2024

Threat Intel
How Phishing Kits Work: Unpacking Cybercriminal Tools in 2024Dec 10, 2024

Product
When Proofpoint Fell Short: Why a Fortune 500 Insurance Provider Turned to Abnormal for Advanced Threat DetectionDec 2, 2024

Threat Intel
What Happened to WormGPT and What Are Cybercriminals Using Now?Nov 26, 2024

Product
255 Hours of SOC Productivity Reclaimed: Industrial Equipment Leader Chooses Abnormal Over ProofpointNov 4, 2024

Product
159 High-Risk Vendor Accounts Detected: Multinational Healthcare Services Provider Reduces Supply Chain Risk by Replacing Proofpoint with AbnormalOct 25, 2024

Product
1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to AbnormalOct 14, 2024

Product
Saving 2,600+ Hours Per Month: Top Mortgage Lender Chooses Abnormal Over ProofpointSep 30, 2024

Threat Intel
Cybercriminals Use Evilginx to Bypass MFA: Gmail, Outlook, and Yahoo Among Top TargetsSep 19, 2024

Product
10X Better Protection: Fortune 1000 Manufacturer Replaces Proofpoint with AbnormalSep 11, 2024

Threat Intel
Protecting Your Microsoft Accounts: Understanding the Top 5 Cyberattack TacticsSep 4, 2024

Threat Intel
Education Sector Hit Hard: 650,000 Emails Exposed in Recent CyberattacksAug 28, 2024

Threat Intel
The Price of Secrets: How Initial Access Brokers Value Corporate Access CredentialsAug 13, 2024

Security Solutions
Attackers Exploit Proofpoint to Target Customers with Brand Impersonation AttacksJul 31, 2024

Threat Intel
French Companies Face Olympic-Sized Cyber ThreatsJul 23, 2024

Account Takeover
Cross-Platform Account Takeover: 4 Real-World ScenariosJul 22, 2024

Threat Intel
5 Unique Ways Hackers Compromise Accounts That Aren’t PhishingJul 15, 2024

Threat Intel
Cybercriminals Pose as Unofficial Travel Agents to Scam ConsumersJun 18, 2024

Threat Intel
Cybercriminals Exploit B2B Lead Generation Tools for Business Email Compromise AttacksJun 5, 2024

Threat Intel
How Cybercriminals Attempt To Dodge Prosecution With Legal DisclaimersMay 21, 2024

Threat Intel
Cybercriminals Exploit Docusign with Customizable Phishing TemplatesMay 15, 2024

Threat Intel
SendGrid And Mailtrap Credentials Sold On Cybercrime Forums For Just $15Apr 25, 2024