chat
expand_more

L Blog Author

Abnormal AI

Abnormal AI provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop socially-engineered and never-seen-before email attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, ransomware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation.

Blog Thumbnail

Threat Intel

The Dark Web Economy for Compromised Government and Police Email Accounts

Aug 14, 2025

/

6 min read

Blog Thumbnail

Threat Intel

SharePoint “ToolShell” Exploit: Guidance for CISOs

Jul 22, 2025

/

3 min read

Blog Thumbnail

Threat Intel

Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation Attacks

Jul 1, 2025

Blog Thumbnail

Threat Intel

Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout Hijacks

Jun 12, 2025

Blog Thumbnail

Threat Intel

EvilPanel: The New Face of Automated AiTM Phishing

May 15, 2025

Blog Thumbnail

Data & Trends

From Ineffective to Intelligent: Rethinking SAT with AI-Driven Insights

May 13, 2025

Blog Thumbnail

Product

By the Numbers: The Real ROI of Replacing a SEG with Abnormal

May 7, 2025

Blog Thumbnail

Threat Intel

ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time Monitoring

Apr 23, 2025

Blog Thumbnail

Threat Intel

Inside Pig Butchering: A Behavioral Breakdown of a Global Fraud Operation

Apr 15, 2025

Blog Thumbnail

Product

Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint Missed

Apr 11, 2025

Blog Thumbnail

Threat Intel

XFiles: A Fileless Malware Delivered via Phishing Campaigns

Apr 2, 2025

Blog Thumbnail

Product

Forging a Stronger Defense: Why a Global Industrial Manufacturer Added Abnormal to Block What Proofpoint Couldn’t

Mar 28, 2025

Blog Thumbnail

Threat Intel

Inside Atlantis AIO: Credential Stuffing Across 140+ Platforms

Mar 25, 2025

Blog Thumbnail

Threat Intel

Exploring Black Basta’s Use of Generative AI to Supercharge Cybercrime

Mar 24, 2025

Blog Thumbnail

Product

Underwriting a More Secure Future: How Abnormal Delivered What Proofpoint Couldn’t for a Top Insurance Provider

Mar 14, 2025

Blog Thumbnail

Product

Fueling Stronger Security: How Abnormal Filled Gaps Left by Proofpoint for a Leading Fuel and Convenience Retailer

Feb 28, 2025

Blog Thumbnail

Threat Intel

Multi-Layered Cryptocurrency Fraud: How CryptoGrab Drains Millions Through Scam Websites and Phishing

Feb 19, 2025

Blog Thumbnail

Threat Intel

Protect Your Google Accounts: 5 Ways Cybercriminals Exploit Google Services

Feb 11, 2025

Blog Thumbnail

Product

First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital System

Feb 5, 2025

Blog Thumbnail

Product

Luxury Secured: Why an Upscale Hotel and Resort Brand Trusted Abnormal to Succeed Where Proofpoint Fell Short

Jan 27, 2025

Blog Thumbnail

Threat Intel

How GhostGPT Empowers Cybercriminals with Uncensored AI

Jan 23, 2025

Blog Thumbnail

Product

A Better Route Forward: Why a Leading Travel Services Provider Chose Abnormal to Address Proofpoint’s Limitations

Jan 17, 2025

Blog Thumbnail

Threat Intel

How Threat Actors Weaponize Google Translate for Phishing

Jan 10, 2025

Blog Thumbnail

Product

Full Speed Ahead: Why a Fortune 500 Automotive Leader Trusted Abnormal to Fill Gaps Left by Proofpoint

Jan 3, 2025

Blog Thumbnail

Product

Driving Security Forward: Why a Fortune 500 Transportation Giant Found Proofpoint Lacking and Turned to Abnormal

Dec 20, 2024

Blog Thumbnail

Product

Raising the Bar: How Abnormal Delivered What Proofpoint Couldn’t for a Fortune 500 Insurance Leader

Dec 13, 2024

Blog Thumbnail

Threat Intel

How Phishing Kits Work: Unpacking Cybercriminal Tools in 2024

Dec 10, 2024

Blog Thumbnail

Product

When Proofpoint Fell Short: Why a Fortune 500 Insurance Provider Turned to Abnormal for Advanced Threat Detection

Dec 2, 2024

Blog Thumbnail

Threat Intel

What Happened to WormGPT and What Are Cybercriminals Using Now?

Nov 26, 2024

Blog Thumbnail

Product

255 Hours of SOC Productivity Reclaimed: Industrial Equipment Leader Chooses Abnormal Over Proofpoint

Nov 4, 2024

Blog Thumbnail

Product

159 High-Risk Vendor Accounts Detected: Multinational Healthcare Services Provider Reduces Supply Chain Risk by Replacing Proofpoint with Abnormal

Oct 25, 2024

Blog Thumbnail

Product

1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to Abnormal

Oct 14, 2024

Blog Thumbnail

Product

Saving 2,600+ Hours Per Month: Top Mortgage Lender Chooses Abnormal Over Proofpoint

Sep 30, 2024

Blog Thumbnail

Product

10X Better Protection: Fortune 1000 Manufacturer Replaces Proofpoint with Abnormal

Sep 11, 2024

Blog Thumbnail

Security Solutions

Attackers Exploit Proofpoint to Target Customers with Brand Impersonation Attacks

Jul 31, 2024

Blog Thumbnail

Data & Trends

10 Must-Know Email Attack Stats for Cybersecurity Awareness Month

Oct 2, 2023

Blog Thumbnail

CISO Insights

Webinar Recap: 4 Insights from the Clemson University CISO

Sep 19, 2023

Blog Thumbnail

Data & Trends

Email Security Snapshot: Fast Facts About Modern Threats

May 6, 2022

Blog Thumbnail

Company & Culture

Security is a Team Sport: Abnormal Joins Microsoft as a MISA Partner

Aug 24, 2021

Blog Thumbnail

Credential Phishing

Stop Zero-Day Phishing Attacks with a Defense-In-Depth Approach

Jun 2, 2021

Blog Thumbnail

Attack Stories

Colonial Pipeline Attack: Phishing Email Likely the Culprit

May 13, 2021

Blog Thumbnail

Data & Trends

Tax-Related Email Attacks Set to Spike in May

Apr 28, 2021

Blog Thumbnail

Attack Stories

Fake RFQ Used in Malware Attack

Apr 14, 2021

Blog Thumbnail

Product

Introducing Recipient Engagements

Apr 13, 2021

Blog Thumbnail

Vendor Email Compromise

The Rising Threat of Vendor Email Compromise: Webinar Recap

Mar 26, 2021

Blog Thumbnail

Attack Stories

IRS Impersonated in Identity Theft Scheme

Mar 23, 2021

Blog Thumbnail

Product

Enhanced Explainability of Account Takeovers

Mar 20, 2021

Blog Thumbnail

Product

Creating Active Feedback Loops to Detect Advanced Attacks

Mar 1, 2021

Blog Thumbnail

Attack Stories

Microsoft Impersonated to Deliver COVID-19 Phishing Attack

Feb 26, 2021

Blog Thumbnail

Attack Stories

Google Mail Merge Notification Used in Phishing Attack

Feb 19, 2021