Keep up with the latest news in cybersecurity with insight from our team of experts.

Featured Resources

B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B 1500x1500 BLOG AI Phishing Coach Product Announcement
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Read More
B Vendor Email Compromise Case Study Blog
See how a real vendor email compromise attack fooled multiple employees. Learn why VEC succeeds and how AI makes these threats more dangerous.
Read More
B EDU Duo MFA Threat Intel Report Blog

Attackers Steal Duo OTPs to Compromise Higher Ed Accounts

Defensive AI Meets Cover pptx

Defensive AI Meets the Inbox: The CISO Guide for the AI Arms Race

B 1500x1500 BLOG AI Phishing Coach Product Announcement

Introducing AI Phishing Coach: Personalized, Autonomous Security Awareness Training

B Vendor Email Compromise Case Study Blog

Thread Hijacked: Breaking Down a Real Vendor Email Compromise Attack

B 1500x1500 Move Cybersecurity Awareness in Action webinar to Resources
Modern account takeover attacks hide in plain sight. Learn how behavioral AI connects subtle signals to expose and stop stealthy compromises.
Read More
International Detection Efficacy blog Cover
Learn how Abnormal’s localized AI improves detection of multilingual phishing and BEC attacks—bringing cultural nuance to global email security.
Read More
B MKT1020g Convergence S5 Open Graphs On Demand Blog
Check out what you missed and watch all episodes on demand.
Read More
B Cyber LNK
Cyber LNK Builder exploits Windows shortcuts to deliver malicious payloads. Learn how it works and why traditional defenses struggle against it.
Read More
B 1500x1500 BLOG MEP Product Announcement Open Graph
Abnormal Misdirected Email Prevention uses behavioral AI to stop accidental data loss from misdirected emails, delivering autonomous, AI-driven protection for modern enterprises.
Read More
BLOG COVER How Email Security Architecture Shapes Detection and Response
Explore how different email security architectures—gateway, inline, and API-based—each shape detection accuracy, response time, and threat coverage.
Read More
B SOC Unlocked Mid Season
From AI to awareness, learn what today’s top SOC leaders revealed on SOC Unlocked about culture, curiosity, and the future of cybersecurity.
Read More
B Malware Blog 10 27
Learn why the inbox remains the top entry point for malware and how AI defends it.
Read More
B CIO Report 10 29 25
State CIOs are leading digital transformation with purpose. Learn how their approach to AI, accessibility, and modernization is reshaping cybersecurity leadership.
Read More
B Beyond SEG
Traditional secure email gateways were built for a different era of threats. As cybercriminals increasingly use AI to generate sophisticated attacks, many organisations are re-evaluating the role of legacy tools.
Read More
3 Microsoft 365 Attacks Cover pptx
Recent Microsoft 365 attacks expose configuration weaknesses behind cloud email breaches and reveal how posture management can prevent them.
Read More
B SOC Quotes
Improve SOC efficiency with Abnormal AI. Automate phishing triage, investigation, and response to save time and stop advanced threats faster.
Read More
3 New Features AIPC Cover pptx
See the latest AI Phishing Coach updates: self-service branded videos, streamlined simulation audit log, and a micro-learning library for adaptive, engaging security awareness training.
Read More
B SOC CAM
Discover how the SOC mindset that separates reactive teams from resilient defenders, with cybersecurity awareness tips from industry leaders who blend empathy, automation, and continuous learning to strengthen human-centered security.
Read More
B 1500x1500 MKT1042p CSAM 2025 Open Graphs
Discover the eight advanced email threats that often bypass secure email gateways and learn how AI-native security stops these modern, behavior-based attacks.
Read More
ABX Stopping AI Powered Attacks pptx
Explore how Abnormal Behavior Technology (ABX) strengthens email security with behavioral AI to stop phishing, BEC, and AI-powered attacks.
Read More
How Security Teams Use AIDA Cover pptx
Explore the real questions customers ask AI Data Analyst to measure risk, prove ROI, and deliver reporting tailored for executives and boardrooms.
Read More
Impact Solutions Cover pptx
Impact Solutions is the new phishing toolkit making advanced malware delivery accessible to any threat actor. Explore its evasion tactics and payload tricks.
Read More
B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
B 1500x1500 MKT1042m Social graphics for Cybersecurity Awareness Month blog post
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats all year with these 5 tips.
Read More
B SOC Productivity
Discover how AI transforms user-reported emails from a SOC burden into a security advantage, boosting efficiency, accuracy, and trust.
Read More
How AI Helped One Manager Cover
See how a manager with no coding background built an AI-powered system to automate workflows, boost SLA performance, and save 40+ hours weekly.
Read More
B Gov RAMP Announcement Blog
With GovRAMP Authorization, Abnormal AI extends trusted AI-native security to governments and schools nationwide.
Read More
Beyond Security Awareness Cover pptx 1
Traditional security training is broken. Discover how Abnormal AI Phishing Coach leverages AI-driven coaching to reduce human risk and stop modern phishing attacks.
Read More
Discover How It All Works

See How Abnormal AI Protects Humans