Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B 1500x1500 BLOG AI Phishing Coach Product Announcement
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Read More
B Vendor Email Compromise Case Study Blog
See how a real vendor email compromise attack fooled multiple employees. Learn why VEC succeeds and how AI makes these threats more dangerous.
Read More
B EDU Duo MFA Threat Intel Report Blog

Attackers Steal Duo OTPs to Compromise Higher Ed Accounts

Defensive AI Meets Cover pptx

Defensive AI Meets the Inbox: The CISO Guide for the AI Arms Race

B 1500x1500 BLOG AI Phishing Coach Product Announcement

Introducing AI Phishing Coach: Personalized, Autonomous Security Awareness Training

B Vendor Email Compromise Case Study Blog

Thread Hijacked: Breaking Down a Real Vendor Email Compromise Attack

Inside Abnormal AI Cover
Learn why behavior-based AI outperforms static rules in modern email security, reducing false positives while detecting sophisticated attacks.
Read More
Triage That Closes the Loop Cover
Learn how to enhance AI Security Mailbox through a set of best practices that improve verdict explanations, personalize coaching, and streamline phishing-reporting workflows.
Read More
Enhancing SPM Cover
Discover how Abnormal’s improved Security Posture Management gives your team clearer insight into misconfigurations, posture drift, and high-impact fixes to proactively harden Microsoft 365 environments.
Read More
B 1500x1500 MKT1239 How Agencies Can Prepare to Deliver on the Presidents Management Agenda
Explore how agencies can meet the PMA’s expectations by reducing operational burden, improving cybersecurity outcomes, and building architectures ready for AI-era threats.
Read More
B 1500x1500 MKT1210 Open Graph Images SITE ONLY No One Path to Tier 3 How Non Traditional Backgrounds Strengthen the SOC 1
Discover why non-traditional backgrounds make stronger SOC analysts and how AI amplifies their strengths in an era of fast-moving, human-targeted attacks.
Read More
B 1500x1500 MKT1237 Blog post 2026 Email Security Checklist New Year New Inbox Problems
Discover the eight essential email security capabilities every organization needs in 2026 to stay resilient against evolving AI-driven social engineering threats.
Read More
Top 10 Product Updates of 2025 Cover
Discover Abnormal AI’s top 10 product innovations of 2025—from real-time email security coaching to major detection upgrades and M365 posture protection.
Read More
B 1500x1500 MKT1211 Open Graph Images SITE ONLY Building Hybrid Teams
Discover practical strategies for breaking silos, including, aligning incentive structures, shared language, embedding AI governance early with product, engineering, and more.
Read More
B MEP Momentum Blog
AI-powered enhancements to Misdirected Email Prevention reduce misroutes, cut alert noise, and help prevent accidental data loss through outbound email.
Read More
B Inbox Prime AI Blog
Discover how the InboxPrime AI phishing kit automates scalable, believable email attacks and highlights the growing sophistication of AI-driven cybercrime.
Read More
Security Superlatives Cover
Explore 2025’s most sophisticated phishing attacks—from DKIM replay to OAuth abuse and vendor impersonation—and how Abnormal’s behavioral AI stops them.
Read More
End of Static SAT Cover
Static security training can’t keep up with modern threats. See how AI Phishing Coach delivers personalized, AI-driven coaching that evolves with attacker tactics.
Read More
New in IES Cover
Discover the latest updates in Inbound Email Security, including the new Email Digest, URL Rewriting explainability, and enhanced quarantine insights for Microsoft 365.
Read More
Resource Cover 1500x1500 MKT1201 Training Your Employees to Recognize Malicious AI Open Graph Images
Train employees to recognize AI-generated phishing with adaptive, behavior-based simulations and real-time coaching built for modern cyberattacks.
Read More
2025 Gartner MQ Blog Cover
Abnormal was recognized as a Leader and placed furthest on the Completeness of Vision axis in the 2025 Gartner® Magic Quadrant™ for Email Security for the second year in a row.
Read More
Security Postures Library Cover
Learn how the Security Postures Library helps uncover misconfiguration risk in Microsoft 365 by providing clear visibility into posture checks and remediation guidance.
Read More
Resource Cover 1500x1500 MKT1200 Open Graphs for Alert Fatigue Blog
Organisations receive thousands of alerts daily and overwhelmed SOC teams are struggling to keep up. AI shifts the fight back in your favour.
Read More
Resource Cover 1500x1500 MKT1196 Social assets Taming Inbox Overload blog
Email Productivity uses behavioral AI to eliminate graymail and deliver measurable gains in workplace productivity.
Read More
5 Questions to Evaluate AI Mailbox Cover
Learn how to separate real AI innovation from marketing hype with five expert principles for evaluating modern AI mailbox tools.
Read More
B MKT1020g Convergence S5 Open Graphs On Demand Blog
Check out what you missed and watch all episodes on demand.
Read More
Calendar Invite Remediation Cover
Abnormal introduces Calendar Invite Remediation to automatically remove malicious and unwanted Outlook calendar events before users engage.
Read More
B Fake Microsoft Teams Invite Malicious O Auth App
Attackers impersonated Microsoft Teams meeting invites to trick users into authorizing a malicious OAuth app, granting persistent access to Microsoft 365 data.
Read More
From Data to Defense Cover
Security leaders need clarity, not more data. Discover how AI Phishing Coach transforms visibility into defense through executive-ready insights and adaptive credential phishing simulations.
Read More
CISO Guide to Misdirected Email Prevention Cover
Misdirected emails are one of the most overlooked sources of data loss. Learn how behavioral AI helps CISOs detect risky sends, prevent exposure, and preserve trust.
Read More
Loading...