Abnormal Blog/Author/Piotr Wojtyla
Abnormal Blog/Author/Piotr Wojtyla

Piotr Wojtyla
Head of Threat Intel & Platform
Piotr Wojtyla is the Head of Threat Intel & Platform at Abnormal Security, where he leads threat intelligence and platform strategy, focusing on identifying emerging cyber threats, developing innovative solutions, and driving the integration of intelligence-driven insights to enhance cybersecurity capabilities.
Prior to joining Abnormal, he served as a senior director for global security practices and global incident response for Cybereason and then as the Associate Managing Director on the SPARK (Special Projects & Applied Research) team at Kroll. Piotr received a Master’s in Applied Computer Science from Cracow University of Technology. In his free time, Piotr enjoys reading Norwegian thrillers, studying ontology, and trying to convince the world he’s not a hipster.

Credential Phishing
How HTML and JavaScript Fuel Modern Phishing: 3 Real-World ExamplesJul 2, 2025

Attack Stories
Flask Phishing Kit: Targeted Credential Theft Using Open-Source TechnologyJun 10, 2025

Artificial Intelligence
Bypassing Safeguards in Leading AI Tools: ChatGPT, Gemini, ClaudeMay 6, 2025

Threat Intel
Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing LuresApr 16, 2025

Attack Stories
Multi-Stage Phishing Attack Exploits Gamma, an AI-Powered Presentation ToolApr 15, 2025

Artificial Intelligence
When Good GPTs Go Bad: How Trusted AI Tools Are Exploited for AttacksApr 8, 2025

Threat Intel
AI-Generated Zoom Impersonation Attack Exploits Tax Season to Deploy Remote Desktop ToolMar 21, 2025

Threat Intel
Inside the New Wave of Phishing Attacks Exploiting Trusted Design and Diagramming ToolsMar 19, 2025

Attack Stories
Hiding in Plain Sight: How Attackers Use PDF Annotations to Mask Malicious QR CodesMar 4, 2025

Attack Stories
That Word Document Isn’t Broken—It’s a Phishing Attack in DisguiseFeb 13, 2025

Threat Intel
The Never-Ending Loop of Phishing: How Attackers Exploit Psychology to Bypass MFA and Compromise AccountsFeb 5, 2025

Threat Intel
The Punycode Problem: Protecting Your Inbox from Deceptive DomainsJan 15, 2025

Data & Trends
2025 Cyberattack Forecast: Top Email Threats to Watch forDec 11, 2024

Attack Stories
Adversary-in-the-Middle Tactics Elevate Dropbox Phishing Attack Capitalizing on Open EnrollmentNov 18, 2024