chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

Black Hat Product Launch Cover
Abnormal AI announces Security Posture Management for Microsoft 365, international expansion, and Email Security product innovations at Black Hat 2025.
Read More
B 1500x1500 MKT889c Forrester Wave
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Read More
Gartner Peer Insights Customers Choice 2025 Cover
Abnormal AI has been named a 2025 Gartner® Peer Insights™ Customers’ Choice for Email Security Platforms, based entirely on feedback from IT and security professionals. Learn how real users rated Abnormal across key criteria including deployment, support, and product capabilities.
Read More
B 1500x1500 BLOG AI Phishing Coach Product Announcement
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Read More
Black Hat Product Launch Cover

Introducing Security Posture Management for Microsoft 365 (and Six Powerful Platform Enhancements)

B 1500x1500 MKT889c Forrester Wave

Abnormal AI Named a Leader in The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025

Gartner Peer Insights Customers Choice 2025 Cover

Abnormal AI Recognized as a Customers’ Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for Email Security Platforms

B 1500x1500 BLOG AI Phishing Coach Product Announcement

Introducing AI Phishing Coach: Personalized, Autonomous Security Awareness Training

How Manual Triage Undercuts the Modern SOC Cover pptx
Manual email triage drains SOC capacity and delays response to real threats. Discover how an AI-powered abuse mailbox slashes review time by up to 95% and frees thousands of analyst hours annually.
Read More
B MKT1020g Convergence S5 Open Graphs Announcement Blog
Discover how AI is transforming both cyberattacks and defenses from experts on the frontlines of security innovation in our popular web series.
Read More
Pioneering Responsible AI Cover
Abnormal AI achieves ISO/IEC 42001:2023 certification, becoming an early adopter of the global standard for AI governance and risk management.
Read More
B Malware
Discover how generative AI is fueling smarter, stealthier malware—and why behavior-based defenses are critical to stopping these evolving threats.
Read More
B Salesloft Drift Breach Blog
The Salesloft Drift breach exploited OAuth to compromise Salesforce data across 700+ orgs, exposing SaaS integration and posture management risks.
Read More
B Microsoft Direct Send Abuse
Threat actors are abusing Microsoft Direct Send to spoof internal emails. See why legacy defenses fail and how Abnormal prevents these attacks.
Read More
B BEC
Learn why BEC keeps rising with AI and how CISOs can stop attacks before they reach inboxes.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B Anthropic Report Blog
Anthropic’s threat intelligence report reveals exploitation of Claude for AI-enabled attacks like vibe hacking. Learn why AI-native defenses are critical.
Read More
Email as the Adversary Foothold Cover
Major Federal cyber breaches share one overlooked constant: email. This post presents five case studies revealing how attackers exploited the inbox through phishing, credential theft, and forged tokens—and why behavioral, identity-aware AI delivers the decisive advantage over legacy defenses.
Read More
When Custom Rules Break Cover pptx
More rules mean more work—and more risk. See how behavioral AI flips the model by detecting threats without requiring constant manual tuning or rule maintenance.
Read More
B Screen Connect Abuse
Phishing attacks impersonate Zoom and Teams to deliver ScreenConnect, exploiting the legitimate IT tool for stealthy, persistent system access.
Read More
B SEG Replace
Discover how these security leaders modernized their security stack, saved time, and lowered security costs by replacing their SEG with Abnormal.
Read More
8 Threats Redefining CES Cover pptx
Discover the 8 threats reshaping cloud email security in 2025 and the AI-native capabilities SOC teams need to stay ahead of attackers.
Read More
Five 2025 Trends Every Banking
Explore five trends shaping email security for technical teams in 2025 and practical steps to help you stay ahead.
Read More
B Compromised Police Government Accounts
Cybercriminals are selling active .gov and .police accounts, enabling identity takeover, fraudulent subpoenas, and access to sensitive law enforcement systems.
Read More
IBM 2025 Data Breach Cover
Phishing and vendor email compromise are now among the costliest breach vectors, as the average U.S. data breach surpasses $10 million.
Read More
Inside the Fault Tolerant Scoring Cover
How Abnormal engineered a resilient, self-healing AI detection platform that maintains high precision even when dependencies fail.
Read More
B Cyber Savvy BSI
Discover how BSI CISO Mike Pitman is advancing cyber resilience in the face of AI threats, zero-day vulnerabilities, and budget constraints—while supporting a sustainable future for security.
Read More
B SOC Unlocked S 2
Discover key takeaways from the Season 2 premiere of SOC Unlocked, featuring Patti Titus, Field CISO at Abnormal AI, as she shares insights on cyber leadership, human risk, AI, and building a resilient security career.
Read More
B AI Trust
Discover why transparency is essential to AI adoption in the SOC. Learn how trust, governance, and model explainability are shaping the future of cybersecurity operations.
Read More
Black Hat Product Launch Cover
Abnormal AI announces Security Posture Management for Microsoft 365, international expansion, and Email Security product innovations at Black Hat 2025.
Read More
Security Posture Management M365
Secure your Microsoft 365 environment with AI-driven Security Posture Management guided by threat intelligence. Detect and remediate misconfigurations before attackers weaponize them to gain access or escalate privileges.
Read More
Hard Truths Ai That Works Cover
Catch up on major insights, top sessions, and full on-demand access from Abnormal Innovate: Summer Update, the summit on the future of AI email security.
Read More
Discover How It All Works

See How Abnormal AI Protects Humans