Keep up with the latest news in cybersecurity with insight from our team of experts.
Introducing Auto Forwarding Mail Protection for Microsoft 365 cover
Abnormal now inspects auto-forwarded Microsoft 365 email before it reaches tools like Salesforce, Zendesk, and ServiceNow, blocking phishing and BEC upstream.
Read More
Advancing SPM Cover
A single compromised admin triggered 200,000 device wipes. Learn why rethinking security posture in Microsoft 365 is key to containing risk.
Read More
CRN Women of the Channel Cover
Six Abnormal AI leaders have been named to CRN’s 2026 Women of the Channel list, recognizing their impact on partner programs, innovation, and channel success.
Read More
Tycoon 2 FA Cover
Twenty days after Europol seized 330 Tycoon2FA domains, a new campaign emerged with rebuilt infrastructure and six layers of obfuscation. Here's how it works.
Read More
Measuring Culture Change Cover
Security teams rely on employee reporting but struggle to measure its impact. Metrics like reporting activity, response times, and feedback loops reveal whether security awareness is driving real behavior change.
Read More
Why M365 Still Needs Cover
Learn how attackers exploit Microsoft 365 misconfigurations like OAuth abuse and legacy auth—and why a behavioral layer is critical for modern defense.
Read More
1500x1500 MKT1526 Site Open Graph Images Omdia Blog
AI-powered, human-targeted attacks are outpacing traditional defenses. Learn why security teams are overwhelmed and what needs to change to keep up.
Read More
1500x1500 MKT1521 Site Open Graphs for Human Risk Blog
Security awareness training only works if it changes how people behave when a real threat hits their inbox. Here’s how a modern, AI-enhanced approach turns your workforce into a proactive line of defense.
Read More
Attack Landscape Report Blog 2 Cover
Analysis of nearly 800,000 attacks shows how phishing techniques adapt to the workflows, defenses, and platforms of the organizations they target.
Read More
B 2026 Attack Landscape Report Blog
Nearly 800,000 attacks reveal how BEC tactics shift with operational characteristics. See which impersonation strategies target organizations like yours.
Read More
Teams Security Stack Cover
Learn how to layer Microsoft Teams policies, incident response playbooks, and automated remediation to defend against the threats native controls can't stop.
Read More
Stop Fraud With Vendor Base Cover
Vendor email compromise and impersonation are rising. See how VendorBase delivers continuous vendor discovery and real-time risk analysis—powered by federated intelligence—to stop vendor fraud faster.
Read More
B ATHR Blog
A cybercrime platform called ATHR uses AI vishing agents, credential harvesting panels, and built-in phishing mailers to execute and scale TOAD attacks.
Read More
1500x1500 FBI C3 Report Recap
The FBI’s 2025 IC3 report logged 22,364 AI-related complaints and nearly $893 million in losses, showing how AI is accelerating business email compromise and social engineering at scale.
Read More
5 Ways to Immediate Value Cover
See how the Abnormal Behavior Platform delivers immediate value by stopping advanced email attacks, remediating account takeovers, automating user-reported email triage, reducing graymail, and strengthening security posture.
Read More
1500x1500 MKT1478 Preparing for AI Regulation What CIS Os Can Do Now
AI regulation is reshaping security leadership as CISOs govern and defend AI behavior, not just secure systems.
Read More
1500x1500 Behavioral AI Account Takeover
How modern account takeover attacks bypass traditional detection and how behavioral AI actually stops them.
Read More
B Evil Tokens
A phishing-as-a-service platform is exploiting Microsoft’s Device Code OAuth flow at scale, then weaponizing stolen tokens with AI-powered email intelligence to automate business email compromise.
Read More
B VENOM Phaa S Blog
A previously undocumented phishing platform is targeting CEOs and CFOs by name, exploiting live Microsoft authentication to establish persistent access.
Read More
How Email Productivity Cuts 12% of Inbox Volume Cover
Abnormal Email Productivity automates graymail management to reduce inbox noise, cut manual effort, and free lean SOC teams to focus on higher-value security operations.
Read More
Phishing Score Cover
Learn how Abnormal's behavioral model uses signals, recency, and context—not just clicks—to deliver a more accurate and actionable phishing risk score.
Read More
B Tracking Iran Aligned Cyber Operations
Iran-aligned groups are conducting cyber operations after strikes by the U.S. and Israel. Explore their tactics and how Abnormal can strengthen defenses.
Read More
Microsoft Teams Attachment and Auto Cover
Protect Microsoft Teams from malicious files and phishing. Learn how real-time attachment scanning and auto-remediation reduce risk and dwell time.
Read More
1500x1500 MKT1427 SITE ONLY Blog Open Graphs When Behavioral AI Meets Threat Intelligence
Behavioral models live or die on the signals they see. The next frontier uses AI to connect normal user behavior with attack behavior, sharpening detection with each event.
Read More
Loading...