Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B VENOM Phaa S Blog
A previously undocumented phishing platform is targeting CEOs and CFOs by name, exploiting live Microsoft authentication to establish persistent access.
Read More
Phishing Score Cover
Learn how Abnormal's behavioral model uses signals, recency, and context—not just clicks—to deliver a more accurate and actionable phishing risk score.
Read More
Unveiling Attune Cover
Attune 1.0 transforms detection with a unified behavioral intelligence architecture built for an AI-driven threat landscape.
Read More
French VEC Attack Cover
See how attackers weaponized a legitimate vendor's Microsoft 365 account to deliver a French-language VEC attack that cleared every standard authentication check.
Read More
B VENOM Phaa S Blog

Meet VENOM: The PhaaS Platform That Neutralizes MFA

Phishing Score Cover

An Abnormal Theory on Human Risk: The Formula Behind Abnormal’s Phishing Risk Score

Unveiling Attune Cover

Unveiling Attune: Modern Email Security Meets Behavioral Intelligence

French VEC Attack Cover

French-Language VEC Attack Exploits Compromised Vendor Account and Cloudflare-Hosted Portal

Stop Fraud With Vendor Base Cover
Vendor email compromise and impersonation are rising. See how VendorBase delivers continuous vendor discovery and real-time risk analysis—powered by federated intelligence—to stop vendor fraud faster.
Read More
B ATHR Blog
A cybercrime platform called ATHR uses AI vishing agents, credential harvesting panels, and built-in phishing mailers to execute and scale TOAD attacks.
Read More
1500x1500 FBI C3 Report Recap
The FBI’s 2025 IC3 report logged 22,364 AI-related complaints and nearly $893 million in losses, showing how AI is accelerating business email compromise and social engineering at scale.
Read More
5 Ways to Immediate Value Cover
See how the Abnormal Behavior Platform delivers immediate value by stopping advanced email attacks, remediating account takeovers, automating user-reported email triage, reducing graymail, and strengthening security posture.
Read More
1500x1500 MKT1478 Preparing for AI Regulation What CIS Os Can Do Now
AI regulation is reshaping security leadership as CISOs govern and defend AI behavior, not just secure systems.
Read More
1500x1500 Behavioral AI Account Takeover
How modern account takeover attacks bypass traditional detection and how behavioral AI actually stops them.
Read More
B Evil Tokens
A phishing-as-a-service platform is exploiting Microsoft’s Device Code OAuth flow at scale, then weaponizing stolen tokens with AI-powered email intelligence to automate business email compromise.
Read More
B VENOM Phaa S Blog
A previously undocumented phishing platform is targeting CEOs and CFOs by name, exploiting live Microsoft authentication to establish persistent access.
Read More
How Email Productivity Cuts 12% of Inbox Volume Cover
Abnormal Email Productivity automates graymail management to reduce inbox noise, cut manual effort, and free lean SOC teams to focus on higher-value security operations.
Read More
Phishing Score Cover
Learn how Abnormal's behavioral model uses signals, recency, and context—not just clicks—to deliver a more accurate and actionable phishing risk score.
Read More
B Tracking Iran Aligned Cyber Operations
Iran-aligned groups are conducting cyber operations after strikes by the U.S. and Israel. Explore their tactics and how Abnormal can strengthen defenses.
Read More
Microsoft Teams Attachment and Auto Cover
Protect Microsoft Teams from malicious files and phishing. Learn how real-time attachment scanning and auto-remediation reduce risk and dwell time.
Read More
1500x1500 MKT1427 SITE ONLY Blog Open Graphs When Behavioral AI Meets Threat Intelligence
Behavioral models live or die on the signals they see. The next frontier uses AI to connect normal user behavior with attack behavior, sharpening detection with each event.
Read More
1500x1500 Cover MKT1433 Social Open Graph Images White House Cybercrime Blog
The White House’s latest executive order reframes cybercrime as a national security issue and puts email at the center. Discover why phishing remains the primary attack vector and how AI-native defenses can stop it.
Read More
French VEC Attack Cover
See how attackers weaponized a legitimate vendor's Microsoft 365 account to deliver a French-language VEC attack that cleared every standard authentication check.
Read More
AI First HRM Cover
AI Phishing Coach helps mitigate human risk with a new dynamic scoring dashboard and realistic BEC/VEC simulations.
Read More
Unveiling Attune Cover
Attune 1.0 transforms detection with a unified behavioral intelligence architecture built for an AI-driven threat landscape.
Read More
How Explainable AI Brings Clarity CES Cover
Learn how explainable AI brings clarity to cloud email security, giving SOC teams insight into detection decisions and greater confidence in automated defenses.
Read More
When Every Attack is a Novel Attack Cover
Abnormal introduces Attune 1.0, new visibility and control capabilities, and advances in human risk management, marking the next evolution of behavioral security.
Read More
Measure What Matters Graymail Cover
Abnormal’s revamped Email Productivity Dashboard makes it easy to measure graymail impact, track deployment, and export executive-ready reporting on hours saved, coverage, and trends.
Read More
1500x1500 MKT1419 SITE ONLY Open Graphs for Blog Building a Culture of Proactive Threat Defense
Cybersecurity is shifting from reactive response to proactive, AI-powered defense. Learn how predictive resilience helps organizations outpace modern threats.
Read More
RSAC 2026 Carousel Blog Cover
Abnormal AI heads to RSA Conference 2026 to showcase the Abnormal Behavior Platform. Join us for AI-driven security insights, BEC defense, and exclusive RSAC events.
Read More
Building a Closed Loop Phishing Defense Cover
Abnormal transforms every employee-reported email into automated remediation and personalized coaching without increasing SOC workload.
Read More
Inside the Engine ATO Cover
Learn why behavioral AI outperforms static rules in detecting account takeover, reducing false positives while uncovering sophisticated identity attacks.
Read More
Loading...