Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Featured Resources
Abnormal and CrowdStrike celebrate three years of partnership, unifying AI-based email security, identity, endpoint, and SIEM to detect and stop sophisticated attacks faster.
Security awareness training is shifting from generic compliance to measurable human risk management. Abnormal AI's Field CISO explains how AI drives real behavior change across the organization.
Abnormal welcomes Stephen Harrison as VP of Product, Next Gen Products, to expand its behavioral AI security platform and accelerate AI-native innovation.
Attackers increasingly pivot from email into Microsoft Teams using trusted identities. Learn how multi-channel attacks work and why Teams has become a prime target.
Go inside Starkiller's control panel to see how headless browsers and reverse proxies enable enterprise-grade phishing infrastructure with MFA bypass.
Discover the top Microsoft 365 security gaps identified across Abnormal deployments and how Security Posture Management helps close them.
AI-powered attacks demand AI-native security. Explore how foundational platform architecture shapes detection accuracy, automated response, and modern cyber defense.
Why transparency in email security shouldn’t require ongoing rule maintenance.
Abnormal expands Email Account Takeover Protection with centralized visibility into organizational trends, suspicious user activity, and attacker access paths.
Learn how ShinyHunters uses hybrid vishing, credential harvesting, and MFA abuse to compromise SSO and pivot into SaaS environments.
Learn how AI enables adaptive, multi-language security awareness training, delivering realistic phishing simulations and custom training videos for global teams.
APIs define today’s trust perimeter. Learn why CISOs must treat API keys, tokens, and service accounts as identities to secure modern enterprises.
Agentic IDEs can write and execute code with engineer privileges. This interview explores the new attack surface AI coding tools introduce.
Recognized as a 2026 CRN Channel Chief, Abnormal AI's VP of Worldwide Channel Sales reflects on partner-led growth, global momentum, and building a durable channel ecosystem.
Abnormal AI announces an integration with Netskope, bringing automated email threat intelligence-sharing to cloud and web enforcement.
Attackers exploit Microsoft Entra ID to inject malicious messages into legitimate system emails, bypassing authentication and deceiving users.
In cloud-first environments, third-party SEGs deliver diminishing returns. Modern email security builds on native cloud protections rather than duplicating them.
Learn why a global manufacturer replaced KnowBe4 with Abnormal AI, consolidating phishing reporting, security awareness, and behavioral AI-driven coaching to reduce noise and manual workload.
Modern account takeover starts with identity abuse, not exploits. Behavioral detection is essential once compromise unfolds after authentication.
From stolen session cookies to deepfakes your own mom would fall for, the tactics outsmarting enterprise security require a fundamental shift in how we think about protection.
Attackers are exploiting trust, identity, and routine workflows. Get an in-depth look at the tactics and techniques threat actors will be refining in 2026.
ClickFix attacks rely on user-initiated commands instead of malicious payloads, underscoring the need for behavior-driven detection in email security.
Real threat actors are using AI-powered tools like HTMLMIX to bypass email filters at scale. Here's how the tool works and how to defend against it.
Abnormal AI's and Cyera’s AI-native partnership advances email security, identity protection, and data loss prevention (DLP) to stop AI-driven attacks and reduce data exposure across cloud environments.































