chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B 1500x1500 BLOG AI Phishing Coach Product Announcement
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Read More
B Vendor Email Compromise Case Study Blog
See how a real vendor email compromise attack fooled multiple employees. Learn why VEC succeeds and how AI makes these threats more dangerous.
Read More
B EDU Duo MFA Threat Intel Report Blog

Attackers Steal Duo OTPs to Compromise Higher Ed Accounts

Defensive AI Meets Cover pptx

Defensive AI Meets the Inbox: The CISO Guide for the AI Arms Race

B 1500x1500 BLOG AI Phishing Coach Product Announcement

Introducing AI Phishing Coach: Personalized, Autonomous Security Awareness Training

B Vendor Email Compromise Case Study Blog

Thread Hijacked: Breaking Down a Real Vendor Email Compromise Attack

BLOG COVER How Email Security Architecture Shapes Detection and Response
Explore how different email security architectures—gateway, inline, and API-based—each shape detection accuracy, response time, and threat coverage.
Read More
B SOC Unlocked Mid Season
From AI to awareness, learn what today’s top SOC leaders revealed on SOC Unlocked about culture, curiosity, and the future of cybersecurity.
Read More
B Malware Blog 10 27
Learn why the inbox remains the top entry point for malware and how AI defends it.
Read More
B CIO Report 10 29 25
State CIOs are leading digital transformation with purpose. Learn how their approach to AI, accessibility, and modernization is reshaping cybersecurity leadership.
Read More
B Beyond SEG
Traditional secure email gateways were built for a different era of threats. As cybercriminals increasingly use AI to generate sophisticated attacks, many organisations are re-evaluating the role of legacy tools.
Read More
3 Microsoft 365 Attacks Cover pptx
Recent Microsoft 365 attacks expose configuration weaknesses behind cloud email breaches and reveal how posture management can prevent them.
Read More
B SOC Quotes
Improve SOC efficiency with Abnormal AI. Automate phishing triage, investigation, and response to save time and stop advanced threats faster.
Read More
3 New Features AIPC Cover pptx
See the latest AI Phishing Coach updates: self-service branded videos, streamlined simulation audit log, and a micro-learning library for adaptive, engaging security awareness training.
Read More
B SOC CAM
Discover how the SOC mindset that separates reactive teams from resilient defenders, with cybersecurity awareness tips from industry leaders who blend empathy, automation, and continuous learning to strengthen human-centered security.
Read More
B 1500x1500 MKT1042p CSAM 2025 Open Graphs
Discover the eight advanced email threats that often bypass secure email gateways and learn how AI-native security stops these modern, behavior-based attacks.
Read More
ABX Stopping AI Powered Attacks pptx
Explore how Abnormal Behavior Technology (ABX) strengthens email security with behavioral AI to stop phishing, BEC, and AI-powered attacks.
Read More
How Security Teams Use AIDA Cover pptx
Explore the real questions customers ask AI Data Analyst to measure risk, prove ROI, and deliver reporting tailored for executives and boardrooms.
Read More
Impact Solutions Cover pptx
Impact Solutions is the new phishing toolkit making advanced malware delivery accessible to any threat actor. Explore its evasion tactics and payload tricks.
Read More
B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
B 1500x1500 MKT1042m Social graphics for Cybersecurity Awareness Month blog post
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats all year with these 5 tips.
Read More
B SOC Productivity
Discover how AI transforms user-reported emails from a SOC burden into a security advantage, boosting efficiency, accuracy, and trust.
Read More
How AI Helped One Manager Cover
See how a manager with no coding background built an AI-powered system to automate workflows, boost SLA performance, and save 40+ hours weekly.
Read More
B Gov RAMP Announcement Blog
With GovRAMP Authorization, Abnormal AI extends trusted AI-native security to governments and schools nationwide.
Read More
Beyond Security Awareness Cover pptx 1
Traditional security training is broken. Discover how Abnormal AI Phishing Coach leverages AI-driven coaching to reduce human risk and stop modern phishing attacks.
Read More
B SOC Culture
Strong SOCs aren’t built once—they’re built daily. See how culture and recognition prevent burnout and boost resilience.
Read More
How Manual Triage Undercuts the Modern SOC Cover pptx
Manual email triage drains SOC capacity and delays response to real threats. Discover how an AI-powered abuse mailbox slashes review time by up to 95% and frees thousands of analyst hours annually.
Read More
B MKT1020g Convergence S5 Open Graphs Announcement Blog
Discover how AI is transforming both cyberattacks and defenses from experts on the frontlines of security innovation in our popular web series.
Read More
Pioneering Responsible AI Cover
Abnormal AI achieves ISO/IEC 42001:2023 certification, becoming an early adopter of the global standard for AI governance and risk management.
Read More
B Malware
Discover how generative AI is fueling smarter, stealthier malware—and why behavior-based defenses are critical to stopping these evolving threats.
Read More
Discover How It All Works

See How Abnormal AI Protects Humans