Abnormal Blog/Author/Callie Baron
Abnormal Blog/Author/Callie Baron
Callie Baron
Senior Content Marketing Manager, Threat Intelligence
Callie Baron is the Senior Content Marketing Manager, Threat Intelligence at Abnormal AI, where she strengthens Abnormal's position as a thought leader by owning the creation and curation of resources that explore the latest attack types and trends, developments in the threat landscape, and the intersection of AI and cybersecurity.
She is a seasoned writer and content strategist with more than a decade of experience in B2B technology marketing and is staunchly committed to following Ann Handley’s Rule of FIWTSBS—“Find Interesting Ways to Say Boring Stuff.”

Threat Intel
Global Email Threat Landscape: Eye-Opening VEC and BEC Engagement Trends by RegionJul 7, 2025

Credential Phishing
How HTML and JavaScript Fuel Modern Phishing: 3 Real-World ExamplesJul 2, 2025

Threat Intel
Thread Hijacked: Breaking Down a Real Vendor Email Compromise AttackJun 17, 2025

Attack Stories
Flask Phishing Kit: Targeted Credential Theft Using Open-Source TechnologyJun 10, 2025

Threat Intel
The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email CompromiseJun 3, 2025

Artificial Intelligence
Bypassing Safeguards in Leading AI Tools: ChatGPT, Gemini, ClaudeMay 6, 2025

Data & Trends
Verizon 2025 DBIR: Key Takeaways for Modern Email SecurityApr 25, 2025

Threat Intel
Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing LuresApr 16, 2025

Attack Stories
Multi-Stage Phishing Attack Exploits Gamma, an AI-Powered Presentation ToolApr 15, 2025

Artificial Intelligence
When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for AttacksApr 8, 2025

Threat Intel
AI-Generated Zoom Impersonation Attack Exploits Tax Season to Deploy Remote Desktop ToolMar 21, 2025

Threat Intel
New Research: AI’s Role in the Escalating Email Attack LandscapeFeb 12, 2025

Data & Trends
2025 Cyberattack Forecast: Top Email Threats to Watch forDec 11, 2024

Attack Stories
Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open EnrollmentNov 18, 2024

SOC
AI Skills Gaps and Workforce Shortages: Insights from the 2024 ISC2 Cybersecurity Workforce StudyNov 8, 2024

Data & Trends
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy SolutionsAug 21, 2024

Data & Trends
File-Sharing Fraud: Data Reveals 350% Increase in Hard-to-Detect Phishing TrendAug 14, 2024

Data & Trends
IBM Cost of a Data Breach Report: AI + Automation Key to Mitigating ImpactAug 8, 2024

Data & Trends
Open Season: Examining Employee Engagement with Email AttacksJul 2, 2024

Attack Stories
Email Threat Roundup: 5 Sophisticated Attacks Recently Stopped by AbnormalJun 27, 2024

Data & Trends
Email Security Threats in Europe: Insights into Attack TrendsJun 11, 2024

Data & Trends
Verizon 2024 DBIR: Employees Remain Weakest Link in Cybersecurity ChainMay 9, 2024

Threat Intel
Top 8 Alarming Anomalies That Are Evading Your SEGMay 1, 2024

Attack Stories
Adobe Acrobat Sign Impersonators Use Customized Phishing Pages in Email AttacksApr 18, 2024

Data & Trends
The Rise of QR Code Phishing Attacks: Exploring Quishing ThreatsApr 9, 2024

Attack Stories
The Most Interesting Email Attacks We've Caught in 2024 (So Far)Mar 27, 2024

Data & Trends
Top QR Code Attack Targets: Construction and Professional ServicesMar 22, 2024

Business Email Compromise
Threat Report: BEC and VEC Attacks Show No Signs of SlowingFeb 15, 2024

Data & Trends
C-Suite Under Fire: Data Shows Execs Receive 42x More QR Code AttacksFeb 6, 2024

Company & Culture
A Year in Cybersecurity: Abnormal's Top Blog Posts from 2023Dec 27, 2023

Business Email Compromise
11 Most Costly BEC Attack Examples of the Past 10 YearsApr 28, 2023

Credential Phishing
5 Reasons Phishing is Your Biggest Cybersecurity ProblemApr 13, 2023

Company & Culture
Q1 2023 in Review: 7 Must-Read Blog Posts from AbnormalMar 31, 2023

Business Email Compromise
What to Do After Receiving a Business Email Compromise AttackMar 24, 2023

Business Email Compromise
Addressing Cybersecurity Threats Associated with the SVB ClosureMar 15, 2023

Business Email Compromise
Defending Against Common Social Engineering AttacksMar 1, 2023

Vendor Email Compromise
Real-World Examples of Employees Engaging with Email AttacksFeb 17, 2023

Data & Trends
28% of BEC Attacks Opened by Employees, New Data ShowsFeb 8, 2023

Company & Culture
2022 Content Review: Abnormal's Top 10 Blog PostsDec 22, 2022

Company & Culture
Q3 2022 Content Recap: 5 Blog Posts to Check OutOct 7, 2022

Thought Leadership
5 Crucial Cybersecurity Tips for RetailersSep 20, 2022

Data & Trends
Research Reveals 265 Different Brands Impersonated in Phishing AttacksAug 11, 2022

Company & Culture
Q2 2022 in Review: Abnormal Moments You May Have MissedJul 1, 2022

Attack Stories
Stripe Website Impersonated in Credential Phishing AttackJun 2, 2022

Attack Stories
Attackers Use Legitimate Facebook Infrastructure for Credential PhishingApr 20, 2022