chat
expand_more

Abnormal Improves Email Attack Detection Efficacy by 20%

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
November 12, 2021

One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.

Announcing Increased Email Attack Detection Efficacy

We are constantly improving our differentiated technology and superior efficacy when it comes to stopping email attacks. As a result, we have created and trained a new machine learning model that quickly eliminates identified false negatives, particularly for payloadless attacks like advanced socially-engineered emails and those attempting invoice or payment fraud. The new and improved model can rapidly be retrained to automatically identify novel attacks that evade traditional email solutions to provide our customers with the most effective email protection.

Our new model, now available in the Abnormal product, reduced the false-negative rate by a staggering 20%.

ML model improvement cycle reducing false-negatives by 20%

Continuous ML model improvement cycle.

The tremendous impact of reducing noise from incorrectly flagged email messages saves customers a tremendous amount of time while showing only the most relevant contextual information.

Protect Against Modern BEC and Social Engineering Attacks

In order to protect against modern social engineering attacks, IT security teams need to analyze a broader set of data in order to better understand the context of communications that is constantly learning and improving as bad actors adapt their tactics and techniques. Our full analysis is illustrated in the email content image.

Business Email Compromise sample email with Abnormal detection

This analysis allows customers to:

  • Perform identity modeling of both internal and external (partners, vendors, customers) entities, and analyze more data sources as a part of that modeling.

  • Create relationship graphs to understand, not only the strength of each connection and the frequency of communication, but also the content and tone of the communication.

  • Perform email content analysis using computer vision techniques, natural language processing, deep URL analysis, and threat intelligence.

Abnormal is committed to rapidly innovating to improve our detection capabilities, built-in automation, and processes to help security teams stay ahead of attackers. The updated algorithm brings these innovations, specifically those related to its detection improvements, to the forefront and provides a better experience for our customers.

Want to learn more about how our algorithms stop advanced attacks? Request a demo today.

Abnormal Improves Email Attack Detection Efficacy by 20%

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B Social Engineering
Today’s targeted cyber attacks are so formidable that legacy defences can’t stop them, and even savvy professionals are being fooled. These examples show how sophisticated they’ve become.
Read More
Blog Cover 1500x1500 Template v3 0 DO NOT EDIT OR DELETE
Email bombing turns trusted sources into a smokescreen, flooding inboxes to distract users and hide follow-up threats.
Read More
B Evil Panel Blog
EvilPanel is a new phishing toolkit built on Evilginx that provides a full-featured web interface for launching MFA-bypassing attacks.
Read More
B SAT
Discover why traditional security awareness training isn’t reducing human risk and how AI-driven, personalized training can transform SAT effectiveness in 2025.
Read More
B 1500x1500 Through the Looking Glass RSAC 2026
What did RSAC 2025 reveal about the next wave of cyberthreats—and the AI-powered tools to stop them? Abnormal’s Field CISO shares her top takeaways.
Read More
B 5 8 25 AI Inn
Discover how Abnormal AI accelerates developer velocity with its secure, in-house Model Context Protocol (MCP), integrating tools like GitHub and Jira directly into local environments to streamline workflows without compromising security.
Read More