Abnormal Blog/Author/Abnormal AI
Abnormal Blog/Author/Abnormal AI

Abnormal AI
Abnormal AI provides a leading cloud-native email security platform that leverages AI-based behavioral data science to stop socially-engineered and never-seen-before email attacks that evade traditional secure email gateways. Abnormal delivers a fundamentally different approach that precisely detects and protects against the widest range of attacks including phishing, malware, ransomware, social engineering, spam and graymail, supply chain compromise, and internal account compromise. The Abnormal platform delivers inbound email security, internal and external account takeover protection, and full SOC automation.

Threat Intel
The Dark Web Economy for Compromised Government and Police Email AccountsAug 14, 2025
/
6 min read

Threat Intel
SharePoint “ToolShell” Exploit: Guidance for CISOsJul 22, 2025
/
3 min read

Threat Intel
Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation AttacksJul 1, 2025

Threat Intel
Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout HijacksJun 12, 2025

Threat Intel
EvilPanel: The New Face of Automated AiTM PhishingMay 15, 2025

Data & Trends
From Ineffective to Intelligent: Rethinking SAT with AI-Driven InsightsMay 13, 2025

Product
By the Numbers: The Real ROI of Replacing a SEG with AbnormalMay 7, 2025

Threat Intel
ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time MonitoringApr 23, 2025

Threat Intel
Inside Pig Butchering: A Behavioral Breakdown of a Global Fraud OperationApr 15, 2025

Product
Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint MissedApr 11, 2025

Threat Intel
XFiles: A Fileless Malware Delivered via Phishing CampaignsApr 2, 2025

Product
Forging a Stronger Defense: Why a Global Industrial Manufacturer Added Abnormal to Block What Proofpoint Couldn’tMar 28, 2025

Threat Intel
Inside Atlantis AIO: Credential Stuffing Across 140+ PlatformsMar 25, 2025

Threat Intel
Exploring Black Basta’s Use of Generative AI to Supercharge CybercrimeMar 24, 2025

Product
Underwriting a More Secure Future: How Abnormal Delivered What Proofpoint Couldn’t for a Top Insurance ProviderMar 14, 2025

Product
Fueling Stronger Security: How Abnormal Filled Gaps Left by Proofpoint for a Leading Fuel and Convenience RetailerFeb 28, 2025

Threat Intel
Multi-Layered Cryptocurrency Fraud: How CryptoGrab Drains Millions Through Scam Websites and PhishingFeb 19, 2025

Threat Intel
Protect Your Google Accounts: 5 Ways Cybercriminals Exploit Google ServicesFeb 11, 2025

Product
First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital SystemFeb 5, 2025

Product
Luxury Secured: Why an Upscale Hotel and Resort Brand Trusted Abnormal to Succeed Where Proofpoint Fell ShortJan 27, 2025

Threat Intel
How GhostGPT Empowers Cybercriminals with Uncensored AIJan 23, 2025

Product
A Better Route Forward: Why a Leading Travel Services Provider Chose Abnormal to Address Proofpoint’s LimitationsJan 17, 2025

Threat Intel
How Threat Actors Weaponize Google Translate for PhishingJan 10, 2025

Product
Full Speed Ahead: Why a Fortune 500 Automotive Leader Trusted Abnormal to Fill Gaps Left by ProofpointJan 3, 2025

Product
Driving Security Forward: Why a Fortune 500 Transportation Giant Found Proofpoint Lacking and Turned to AbnormalDec 20, 2024

Product
Raising the Bar: How Abnormal Delivered What Proofpoint Couldn’t for a Fortune 500 Insurance LeaderDec 13, 2024

Threat Intel
How Phishing Kits Work: Unpacking Cybercriminal Tools in 2024Dec 10, 2024

Product
When Proofpoint Fell Short: Why a Fortune 500 Insurance Provider Turned to Abnormal for Advanced Threat DetectionDec 2, 2024

Threat Intel
What Happened to WormGPT and What Are Cybercriminals Using Now?Nov 26, 2024

Product
255 Hours of SOC Productivity Reclaimed: Industrial Equipment Leader Chooses Abnormal Over ProofpointNov 4, 2024

Product
159 High-Risk Vendor Accounts Detected: Multinational Healthcare Services Provider Reduces Supply Chain Risk by Replacing Proofpoint with AbnormalOct 25, 2024

Product
1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to AbnormalOct 14, 2024

Product
Saving 2,600+ Hours Per Month: Top Mortgage Lender Chooses Abnormal Over ProofpointSep 30, 2024

Product
10X Better Protection: Fortune 1000 Manufacturer Replaces Proofpoint with AbnormalSep 11, 2024

Security Solutions
Attackers Exploit Proofpoint to Target Customers with Brand Impersonation AttacksJul 31, 2024

Data & Trends
10 Must-Know Email Attack Stats for Cybersecurity Awareness MonthOct 2, 2023

CISO Insights
Webinar Recap: 4 Insights from the Clemson University CISOSep 19, 2023

Data & Trends
Email Security Snapshot: Fast Facts About Modern ThreatsMay 6, 2022

Company & Culture
Security is a Team Sport: Abnormal Joins Microsoft as a MISA PartnerAug 24, 2021

Credential Phishing
Stop Zero-Day Phishing Attacks with a Defense-In-Depth ApproachJun 2, 2021

Attack Stories
Colonial Pipeline Attack: Phishing Email Likely the CulpritMay 13, 2021

Data & Trends
Tax-Related Email Attacks Set to Spike in MayApr 28, 2021

Attack Stories
Fake RFQ Used in Malware AttackApr 14, 2021

Product
Introducing Recipient EngagementsApr 13, 2021

Vendor Email Compromise
The Rising Threat of Vendor Email Compromise: Webinar RecapMar 26, 2021

Attack Stories
IRS Impersonated in Identity Theft SchemeMar 23, 2021

Product
Enhanced Explainability of Account TakeoversMar 20, 2021

Product
Creating Active Feedback Loops to Detect Advanced AttacksMar 1, 2021

Attack Stories
Microsoft Impersonated to Deliver COVID-19 Phishing AttackFeb 26, 2021

Attack Stories
Google Mail Merge Notification Used in Phishing AttackFeb 19, 2021