chat
expand_more

Author Piotr Wojtyla

Piotr Wojtyla

Head of Threat Intel & Platform

Piotr Wojtyla is the Head of Threat Intel & Platform at Abnormal Security, where he leads threat intelligence and platform strategy, focusing on identifying emerging cyber threats, developing innovative solutions, and driving the integration of intelligence-driven insights to enhance cybersecurity capabilities.

Prior to joining Abnormal, he served as a senior director for global security practices and global incident response for Cybereason and then as the Associate Managing Director on the SPARK (Special Projects & Applied Research) team at Kroll. Piotr received a Master’s in Applied Computer Science from Cracow University of Technology. In his free time, Piotr enjoys reading Norwegian thrillers, studying ontology, and trying to convince the world he’s not a hipster.

Blog Thumbnail

Credential Phishing

How HTML and JavaScript Fuel Modern Phishing: 3 Real-World Examples

Jul 2, 2025

Blog Thumbnail

Attack Stories

Flask Phishing Kit: Targeted Credential Theft Using Open-Source Technology

Jun 10, 2025

Blog Thumbnail

Artificial Intelligence

Bypassing Safeguards in Leading AI Tools: ChatGPT, Gemini, Claude

May 6, 2025

Blog Thumbnail

Threat Intel

Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing Lures

Apr 16, 2025

Blog Thumbnail

Attack Stories

Multi-Stage Phishing Attack Exploits Gamma, an AI-Powered Presentation Tool

Apr 15, 2025

Blog Thumbnail

Artificial Intelligence

When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for Attacks

Apr 8, 2025

Blog Thumbnail

Threat Intel

AI-Generated Zoom Impersonation Attack Exploits Tax Season to Deploy Remote Desktop Tool

Mar 21, 2025

Blog Thumbnail

Threat Intel

Inside the New Wave of Phishing Attacks Exploiting Trusted Design and Diagramming Tools

Mar 19, 2025

Blog Thumbnail

Attack Stories

Hiding in Plain Sight: How Attackers Use PDF Annotations to Mask Malicious QR Codes

Mar 4, 2025

Blog Thumbnail

Attack Stories

That Word Document Isn’t Broken—It’s a Phishing Attack in Disguise

Feb 13, 2025

Blog Thumbnail

Threat Intel

The Never-Ending Loop of Phishing: How Attackers Exploit Psychology to Bypass MFA and Compromise Accounts

Feb 5, 2025

Blog Thumbnail

Threat Intel

The Punycode Problem: Protecting Your Inbox from Deceptive Domains

Jan 15, 2025

Blog Thumbnail

Data & Trends

2025 Cyberattack Forecast: Top Email Threats to Watch for

Dec 11, 2024

Blog Thumbnail

Attack Stories

Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open Enrollment

Nov 18, 2024