Abnormal Blog/Author/Piotr Wojtyla
Abnormal Blog/Author/Piotr Wojtyla

Piotr Wojtyla
Head of Threat Intel & Platform
Piotr Wojtyla is the Head of Threat Intel & Platform at Abnormal Security, where he leads threat intelligence and platform strategy, focusing on identifying emerging cyber threats, developing innovative solutions, and driving the integration of intelligence-driven insights to enhance cybersecurity capabilities.
Prior to joining Abnormal, he served as a senior director for global security practices and global incident response for Cybereason and then as the Associate Managing Director on the SPARK (Special Projects & Applied Research) team at Kroll. Piotr received a Master’s in Applied Computer Science from Cracow University of Technology. In his free time, Piotr enjoys reading Norwegian thrillers, studying ontology, and trying to convince the world he’s not a hipster.

Threat Intel
Cyber LNK Weaponizes Windows Shortcuts for MalwareNov 5, 2025
/
4 min read

Threat Intel
Impact Solutions: The Point-and-Click Toolkit Democratizing Malware DeliveryOct 2, 2025
/
5 min read

Threat Intel
Attackers Steal Duo OTPs to Compromise Higher Ed AccountsOct 1, 2025

Threat Intel
When Integrations Become Exploits: What the Salesloft Drift Breach RevealsSep 5, 2025
/
6 min read

Threat Intel
Microsoft Direct Send Abuse: Why Legacy Defenses Fall ShortSep 4, 2025
/
7 min read

Threat Intel
ScreenConnect Abuse Highlights the Risks of Trusted IT ToolsAug 26, 2025
/
7 min read

Threat Intel
The Dark Web Economy for Compromised Government and Police Email AccountsAug 14, 2025
/
6 min read

Threat Intel
SharePoint “ToolShell” Exploit: Guidance for CISOsJul 22, 2025
/
3 min read

Credential Phishing
How HTML and JavaScript Fuel Modern Phishing: 3 Real-World ExamplesJul 2, 2025

Threat Intel
Custom Phishing Kits: How Cybercriminals Create Bespoke Brand Impersonation AttacksJul 1, 2025

Threat Intel
Inside FluxPanel: How Phishing Enables Real-Time Ecommerce Checkout HijacksJun 12, 2025

Attack Stories
Flask Phishing Kit: Targeted Credential Theft Using Open-Source TechnologyJun 10, 2025