chat
expand_more

Author Callie Hinman

Callie Baron

Senior Content Marketing Manager, Threat Intelligence

Callie Baron is the Senior Content Marketing Manager, Threat Intelligence at Abnormal AI, where she strengthens Abnormal's position as a thought leader by owning the creation and curation of resources that explore the latest attack types and trends, developments in the threat landscape, and the intersection of AI and cybersecurity.

She is a seasoned writer and content strategist with more than a decade of experience in B2B technology marketing and is staunchly committed to following Ann Handley’s Rule of FIWTSBS—“Find Interesting Ways to Say Boring Stuff.”

Blog Thumbnail

Threat Intel

Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by Region

Jul 7, 2025

Blog Thumbnail

Credential Phishing

How HTML and JavaScript Fuel Modern Phishing: 3 Real-World Examples

Jul 2, 2025

Blog Thumbnail

Threat Intel

Thread Hijacked: Breaking Down a Real Vendor Email Compromise Attack

Jun 17, 2025

Blog Thumbnail

Attack Stories

Flask Phishing Kit: Targeted Credential Theft Using Open-Source Technology

Jun 10, 2025

Blog Thumbnail

Threat Intel

The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email Compromise

Jun 3, 2025

Blog Thumbnail

Artificial Intelligence

Bypassing Safeguards in Leading AI Tools: ChatGPT, Gemini, Claude

May 6, 2025

Blog Thumbnail

Data & Trends

Verizon 2025 DBIR: Key Takeaways for Modern Email Security

Apr 25, 2025

Blog Thumbnail

Threat Intel

Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing Lures

Apr 16, 2025

Blog Thumbnail

Attack Stories

Multi-Stage Phishing Attack Exploits Gamma, an AI-Powered Presentation Tool

Apr 15, 2025

Blog Thumbnail

Artificial Intelligence

When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for Attacks

Apr 8, 2025

Blog Thumbnail

Threat Intel

AI-Generated Zoom Impersonation Attack Exploits Tax Season to Deploy Remote Desktop Tool

Mar 21, 2025

Blog Thumbnail

Threat Intel

New Research: AI’s Role in the Escalating Email Attack Landscape

Feb 12, 2025

Blog Thumbnail

Data & Trends

2025 Cyberattack Forecast: Top Email Threats to Watch for

Dec 11, 2024

Blog Thumbnail

Attack Stories

Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open Enrollment

Nov 18, 2024

Blog Thumbnail

SOC

AI Skills Gaps and Workforce Shortages: Insights from the 2024 ISC2 Cybersecurity Workforce Study

Nov 8, 2024

Blog Thumbnail

Data & Trends

Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy Solutions

Aug 21, 2024

Blog Thumbnail

Data & Trends

File-Sharing Fraud: Data Reveals 350% Increase in Hard-to-Detect Phishing Trend

Aug 14, 2024

Blog Thumbnail

Data & Trends

IBM Cost of a Data Breach Report: AI + Automation Key to Mitigating Impact

Aug 8, 2024

Blog Thumbnail

Data & Trends

Open Season: Examining Employee Engagement with Email Attacks

Jul 2, 2024

Blog Thumbnail

Attack Stories

Email Threat Roundup: 5 Sophisticated Attacks Recently Stopped by Abnormal

Jun 27, 2024

Blog Thumbnail

Data & Trends

Email Security Threats in Europe: Insights into Attack Trends

Jun 11, 2024

Blog Thumbnail

Data & Trends

Verizon 2024 DBIR: Employees Remain Weakest Link in Cybersecurity Chain

May 9, 2024

Blog Thumbnail

Threat Intel

Top 8 Alarming Anomalies That Are Evading Your SEG

May 1, 2024

Blog Thumbnail

Attack Stories

Adobe Acrobat Sign Impersonators Use Customized Phishing Pages in Email Attacks

Apr 18, 2024

Blog Thumbnail

Data & Trends

The Rise of QR Code Phishing Attacks: Exploring Quishing Threats

Apr 9, 2024

Blog Thumbnail

Attack Stories

The Most Interesting Email Attacks We've Caught in 2024 (So Far)

Mar 27, 2024

Blog Thumbnail

Data & Trends

Top QR Code Attack Targets: Construction and Professional Services

Mar 22, 2024

Blog Thumbnail

Business Email Compromise

Threat Report: BEC and VEC Attacks Show No Signs of Slowing

Feb 15, 2024

Blog Thumbnail

Data & Trends

C-Suite Under Fire: Data Shows Execs Receive 42x More QR Code Attacks

Feb 6, 2024

Blog Thumbnail

Company & Culture

A Year in Cybersecurity: Abnormal's Top Blog Posts from 2023

Dec 27, 2023

Blog Thumbnail

Business Email Compromise

11 Most Costly BEC Attack Examples of the Past 10 Years

Apr 28, 2023

Blog Thumbnail

Credential Phishing

5 Reasons Phishing is Your Biggest Cybersecurity Problem

Apr 13, 2023

Blog Thumbnail

Company & Culture

Q1 2023 in Review: 7 Must-Read Blog Posts from Abnormal

Mar 31, 2023

Blog Thumbnail

Business Email Compromise

What to Do After Receiving a Business Email Compromise Attack

Mar 24, 2023

Blog Thumbnail

Business Email Compromise

Addressing Cybersecurity Threats Associated with the SVB Closure

Mar 15, 2023

Blog Thumbnail

Business Email Compromise

Defending Against Common Social Engineering Attacks

Mar 1, 2023

Blog Thumbnail

Vendor Email Compromise

Real-World Examples of Employees Engaging with Email Attacks

Feb 17, 2023

Blog Thumbnail

Data & Trends

28% of BEC Attacks Opened by Employees, New Data Shows

Feb 8, 2023

Blog Thumbnail

Company & Culture

2022 Content Review: Abnormal's Top 10 Blog Posts

Dec 22, 2022

Blog Thumbnail

Company & Culture

Q3 2022 Content Recap: 5 Blog Posts to Check Out

Oct 7, 2022

Blog Thumbnail

Thought Leadership

5 Crucial Cybersecurity Tips for Retailers

Sep 20, 2022

Blog Thumbnail

Data & Trends

Research Reveals 265 Different Brands Impersonated in Phishing Attacks

Aug 11, 2022

Blog Thumbnail

Company & Culture

Q2 2022 in Review: Abnormal Moments You May Have Missed

Jul 1, 2022

Blog Thumbnail

Attack Stories

Stripe Website Impersonated in Credential Phishing Attack

Jun 2, 2022

Blog Thumbnail

Attack Stories

Attackers Use Legitimate Facebook Infrastructure for Credential Phishing

Apr 20, 2022