Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B 2026 Threat Forecast
Attackers are exploiting trust, identity, and routine workflows. Get an in-depth look at the tactics and techniques threat actors will be refining in 2026.
Read More
B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B 1500x1500 BLOG AI Phishing Coach Product Announcement
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Read More
B 2026 Threat Forecast

2026 Threat Forecast: Top Attacks Set to Increase Enterprise Exposure

B EDU Duo MFA Threat Intel Report Blog

Attackers Steal Duo OTPs to Compromise Higher Ed Accounts

Defensive AI Meets Cover pptx

Defensive AI Meets the Inbox: The CISO Guide for the AI Arms Race

B 1500x1500 BLOG AI Phishing Coach Product Announcement

Introducing AI Phishing Coach: Personalized, Autonomous Security Awareness Training

Crowdstrike 3 Years 3 Integrations Cover
Abnormal and CrowdStrike celebrate three years of partnership, unifying AI-based email security, identity, endpoint, and SIEM to detect and stop sophisticated attacks faster.
Read More
Awareness to Action Cover
Security awareness training is shifting from generic compliance to measurable human risk management. Abnormal AI's Field CISO explains how AI drives real behavior change across the organization.
Read More
From Operator to Builder Cover
Abnormal welcomes Stephen Harrison as VP of Product, Next Gen Products, to expand its behavioral AI security platform and accelerate AI-native innovation.
Read More
From Inbox to Microsoft Teams Cover
Attackers increasingly pivot from email into Microsoft Teams using trusted identities. Learn how multi-channel attacks work and why Teams has become a prime target.
Read More
B Starkiller Blog
Go inside Starkiller's control panel to see how headless browsers and reverse proxies enable enterprise-grade phishing infrastructure with MFA bypass.
Read More
1500x1500 Cover MKT1373 Blog social graphics for Top Microsoft 365 Security Gaps Exposed by Abnormal
Discover the top Microsoft 365 security gaps identified across Abnormal deployments and how Security Posture Management helps close them.
Read More
AI Native Not AI Augmented Cover
AI-powered attacks demand AI-native security. Explore how foundational platform architecture shapes detection accuracy, automated response, and modern cyber defense.
Read More
Email Security Without the Configuration Tax Cover
Why transparency in email security shouldn’t require ongoing rule maintenance.
Read More
Deciphering Identity Threats Cover
Abnormal expands Email Account Takeover Protection with centralized visibility into organizational trends, suspicious user activity, and attacker access paths.
Read More
B Shiny Hunters SSO Attacks
Learn how ShinyHunters uses hybrid vishing, credential harvesting, and MFA abuse to compromise SSO and pivot into SaaS environments.
Read More
AIPC Global Cover
Learn how AI enables adaptive, multi-language security awareness training, delivering realistic phishing simulations and custom training videos for global teams.
Read More
B 1500x1500 Site Only Open Graphs for API Identity Blog
APIs define today’s trust perimeter. Learn why CISOs must treat API keys, tokens, and service accounts as identities to secure modern enterprises.
Read More
B 1500x1500 MKT1308 Blog social graphics for Shrivus QA
Agentic IDEs can write and execute code with engineer privileges. This interview explores the new attack surface AI coding tools introduce.
Read More
CRN Channel Chiefs Cover 2026
Recognized as a 2026 CRN Channel Chief, Abnormal AI's VP of Worldwide Channel Sales reflects on partner-led growth, global momentum, and building a durable channel ecosystem.
Read More
Netskope Abnormal Cover
Abnormal AI announces an integration with Netskope, bringing automated email threat intelligence-sharing to cloud and web enforcement.
Read More
B System Notification Abuse Blog
Attackers exploit Microsoft Entra ID to inject malicious messages into legitimate system emails, bypassing authentication and deceiving users.
Read More
Essential Guide to Retiring SEG Cover
In cloud-first environments, third-party SEGs deliver diminishing returns. Modern email security builds on native cloud protections rather than duplicating them.
Read More
Why One Manufacturer Replaced Know B4 Cover
Learn why a global manufacturer replaced KnowBe4 with Abnormal AI, consolidating phishing reporting, security awareness, and behavioral AI-driven coaching to reduce noise and manual workload.
Read More
Why Identity Abuse Defines Cover
Modern account takeover starts with identity abuse, not exploits. Behavioral detection is essential once compromise unfolds after authentication.
Read More
B 1500x1500 I MKT1272 Blog assets How Hackers are Outsmarting Modern Security Defenses and Why Behavior Context Matters 1
From stolen session cookies to deepfakes your own mom would fall for, the tactics outsmarting enterprise security require a fundamental shift in how we think about protection.
Read More
B 2026 Threat Forecast
Attackers are exploiting trust, identity, and routine workflows. Get an in-depth look at the tactics and techniques threat actors will be refining in 2026.
Read More
Click Fix Cover
ClickFix attacks rely on user-initiated commands instead of malicious payloads, underscoring the need for behavior-driven detection in email security.
Read More
B HTMLMIX
Real threat actors are using AI-powered tools like HTMLMIX to bypass email filters at scale. Here's how the tool works and how to defend against it.
Read More
Cyera Cover
Abnormal AI's and Cyera’s AI-native partnership advances email security, identity protection, and data loss prevention (DLP) to stop AI-driven attacks and reduce data exposure across cloud environments.
Read More
Loading...