chat
expand_more

Abnormal Improves Email Attack Detection Efficacy by 20%

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
November 12, 2021

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.

Announcing Increased Email Attack Detection Efficacy

We are constantly improving our differentiated technology and superior efficacy when it comes to stopping email attacks. As a result, we have created and trained a new machine learning model that quickly eliminates identified false negatives, particularly for payloadless attacks like advanced socially-engineered emails and those attempting invoice or payment fraud. The new and improved model can rapidly be retrained to automatically identify novel attacks that evade traditional email solutions to provide our customers with the most effective email protection.

Our new model, now available in the Abnormal product, reduced the false-negative rate by a staggering 20%.

ML model improvement cycle reducing false-negatives by 20%

Continuous ML model improvement cycle.

The tremendous impact of reducing noise from incorrectly flagged email messages saves customers a tremendous amount of time while showing only the most relevant contextual information.

Protect Against Modern BEC and Social Engineering Attacks

In order to protect against modern social engineering attacks, IT security teams need to analyze a broader set of data in order to better understand the context of communications that is constantly learning and improving as bad actors adapt their tactics and techniques. Our full analysis is illustrated in the email content image.

Business Email Compromise sample email with Abnormal detection

This analysis allows customers to:

  • Perform identity modeling of both internal and external (partners, vendors, customers) entities, and analyze more data sources as a part of that modeling.

  • Create relationship graphs to understand, not only the strength of each connection and the frequency of communication, but also the content and tone of the communication.

  • Perform email content analysis using computer vision techniques, natural language processing, deep URL analysis, and threat intelligence.

Abnormal is committed to rapidly innovating to improve our detection capabilities, built-in automation, and processes to help security teams stay ahead of attackers. The updated algorithm brings these innovations, specifically those related to its detection improvements, to the forefront and provides a better experience for our customers.

Want to learn more about how our algorithms stop advanced attacks? Request a demo today.

Abnormal Improves Email Attack Detection Efficacy by 20%

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

High Scale Aggregation Cover
At Abnormal AI, detecting malicious behavior at scale means aggregating vast volumes of signals in realtime and batch. This post breaks down how we implemented the Signals DAG across both systems to achieve consistency, speed, and detection accuracy at scale.
Read More
B CISO SAT
Discover how modern CISOs are evolving security awareness training from a compliance checkbox into a strategic, AI-powered program that drives behavior change and builds a security-first culture.
Read More
B Regional VEC BEC Trends Blog
Regional analysis of 1,400+ organizations reveals how geography shapes email security risks. See which regions are most vulnerable to VEC vs BEC.
Read More
B HTML and Java Script Phishing
Explore real phishing attacks that use HTML and JavaScript to bypass defenses and learn what makes these emails so hard to detect.
Read More
B Custom Phishing Kits Blog
Brand-specific phishing kits are replacing generic templates. Learn how these custom phishing kits enable sophisticated impersonation attacks.
Read More
B Healthcare
Discover how healthcare security leaders are defending against AI-powered threats. Learn why identity and email are the new frontlines—and what it takes to protect the human element.
Read More