Abnormal Blog/Author/Callie Baron
Abnormal Blog/Author/Callie Baron
Callie Baron
Senior Content Marketing Manager, Threat Intelligence
Callie Baron is the Senior Content Marketing Manager, Threat Intelligence at Abnormal AI, where she strengthens Abnormal's position as a thought leader by owning the creation and curation of resources that explore the latest attack types and trends, developments in the threat landscape, and the intersection of AI and cybersecurity.
She is a seasoned writer and content strategist with more than a decade of experience in B2B technology marketing and is staunchly committed to following Ann Handley’s Rule of FIWTSBS—“Find Interesting Ways to Say Boring Stuff.”

Threat Intel
Cyber LNK Weaponizes Windows Shortcuts for MalwareNov 5, 2025
/
4 min read

Security Solutions
Top 8 Alarming Anomalies That Are Evading Your SEGOct 8, 2025
/
5 min read

Threat Intel
Impact Solutions: The Point-and-Click Toolkit Democratizing Malware DeliveryOct 2, 2025
/
5 min read

Threat Intel
Attackers Steal Duo OTPs to Compromise Higher Ed AccountsOct 1, 2025

Threat Intel
When Integrations Become Exploits: What the Salesloft Drift Breach RevealsSep 5, 2025
/
6 min read

Threat Intel
Microsoft Direct Send Abuse: Why Legacy Defenses Fall ShortSep 4, 2025
/
7 min read

Artificial Intelligence
Vibe Hacking and AI-Enabled Threats: Lessons from Anthropic’s ReportAug 29, 2025
/
6 min read

Threat Intel
ScreenConnect Abuse Highlights the Risks of Trusted IT ToolsAug 26, 2025
/
7 min read

Threat Intel
The Dark Web Economy for Compromised Government and Police Email AccountsAug 14, 2025
/
6 min read

Threat Intel
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by RegionJul 7, 2025

Credential Phishing
How HTML and JavaScript Fuel Modern Phishing: 3 Real-World ExamplesJul 2, 2025

Threat Intel
Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation AttacksJul 1, 2025

Threat Intel
Thread Hijacked: Breaking Down a Real Vendor Email Compromise AttackJun 17, 2025

Threat Intel
Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout HijacksJun 12, 2025

Attack Stories
Flask Phishing Kit: Targeted Credential Theft Using Open-Source TechnologyJun 10, 2025

Threat Intel
The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email CompromiseJun 3, 2025

Threat Intel
EvilPanel: The New Face of Automated AiTM PhishingMay 15, 2025

Artificial Intelligence
Bypassing Safeguards in Leading AI Tools: ChatGPT, Gemini, ClaudeMay 6, 2025

Industry Research
Verizon 2025 DBIR: Key Takeaways for Modern Email SecurityApr 25, 2025

Threat Intel
ByteDance Live Panel: An Advanced Phishing-as-a-Service Kit with Real-Time MonitoringApr 23, 2025

Threat Intel
Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing LuresApr 16, 2025

Attack Stories
Multi-Stage Phishing Attack Exploits Gamma, an AI-Powered Presentation ToolApr 15, 2025

Artificial Intelligence
When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for AttacksApr 8, 2025

Threat Intel
XFiles: A Fileless Malware Delivered via Phishing CampaignsApr 2, 2025

Threat Intel
Inside Atlantis AIO: Credential Stuffing Across 140+ PlatformsMar 25, 2025

Threat Intel
AI-Generated Zoom Impersonation Attack Exploits Tax Season to Deploy Remote Desktop ToolMar 21, 2025

Threat Intel
Multi-Layered Cryptocurrency Fraud: How CryptoGrab Drains Millions Through Scam Websites and PhishingFeb 19, 2025

Threat Intel
New Research: AI’s Role in the Escalating Email Attack LandscapeFeb 12, 2025

Threat Intel
Protect Your Google Accounts: 5 Ways Cybercriminals Exploit Google ServicesFeb 11, 2025

Threat Intel
How GhostGPT Empowers Cybercriminals with Uncensored AIJan 23, 2025

Threat Intel
How Threat Actors Weaponize Google Translate for PhishingJan 10, 2025

Threat Intel
2025 Cyberattack Forecast: Top Email Threats to Watch forDec 11, 2024

Threat Intel
How Phishing Kits Work: Unpacking Cybercriminal Tools in 2024Dec 10, 2024

Threat Intel
What Happened to WormGPT and What Are Cybercriminals Using Now?Nov 26, 2024

Attack Stories
Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open EnrollmentNov 18, 2024

SOC
AI Skills Gaps and Workforce Shortages: Insights from the 2024 ISC2 Cybersecurity Workforce StudyNov 8, 2024

Data & Trends
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy SolutionsAug 21, 2024

Data & Trends
File-Sharing Fraud: Data Reveals 350% Increase in Hard-to-Detect Phishing TrendAug 14, 2024

Industry Research
IBM Cost of a Data Breach Report: AI + Automation Key to Mitigating ImpactAug 8, 2024

Data & Trends
Open Season: Examining Employee Engagement with Email AttacksJul 2, 2024

Attack Stories
Email Threat Roundup: 5 Sophisticated Attacks Recently Stopped by AbnormalJun 27, 2024

Data & Trends
Email Security Threats in Europe: Insights into Attack TrendsJun 11, 2024

Industry Research
Verizon 2024 DBIR: Employees Remain Weakest Link in Cybersecurity ChainMay 9, 2024

Attack Stories
Adobe Acrobat Sign Impersonators Use Customized Phishing Pages in Email AttacksApr 18, 2024

Data & Trends
The Rise of QR Code Phishing Attacks: Exploring Quishing ThreatsApr 9, 2024

Attack Stories
The Most Interesting Email Attacks We've Caught in 2024 (So Far)Mar 27, 2024

Data & Trends
Top QR Code Attack Targets: Construction and Professional ServicesMar 22, 2024

Business Email Compromise
Threat Report: BEC and VEC Attacks Show No Signs of SlowingFeb 15, 2024

Data & Trends
C-Suite Under Fire: Data Shows Execs Receive 42x More QR Code AttacksFeb 6, 2024

Company & Culture
A Year in Cybersecurity: Abnormal's Top Blog Posts from 2023Dec 27, 2023