Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Featured Resources
Vendor email compromise and impersonation are rising. See how VendorBase delivers continuous vendor discovery and real-time risk analysis—powered by federated intelligence—to stop vendor fraud faster.
A cybercrime platform called ATHR uses AI vishing agents, credential harvesting panels, and built-in phishing mailers to execute and scale TOAD attacks.
The FBI’s 2025 IC3 report logged 22,364 AI-related complaints and nearly $893 million in losses, showing how AI is accelerating business email compromise and social engineering at scale.
See how the Abnormal Behavior Platform delivers immediate value by stopping advanced email attacks, remediating account takeovers, automating user-reported email triage, reducing graymail, and strengthening security posture.
AI regulation is reshaping security leadership as CISOs govern and defend AI behavior, not just secure systems.
How modern account takeover attacks bypass traditional detection and how behavioral AI actually stops them.
A phishing-as-a-service platform is exploiting Microsoft’s Device Code OAuth flow at scale, then weaponizing stolen tokens with AI-powered email intelligence to automate business email compromise.
A previously undocumented phishing platform is targeting CEOs and CFOs by name, exploiting live Microsoft authentication to establish persistent access.
Abnormal Email Productivity automates graymail management to reduce inbox noise, cut manual effort, and free lean SOC teams to focus on higher-value security operations.
Learn how Abnormal's behavioral model uses signals, recency, and context—not just clicks—to deliver a more accurate and actionable phishing risk score.
Iran-aligned groups are conducting cyber operations after strikes by the U.S. and Israel. Explore their tactics and how Abnormal can strengthen defenses.
Protect Microsoft Teams from malicious files and phishing. Learn how real-time attachment scanning and auto-remediation reduce risk and dwell time.
Behavioral models live or die on the signals they see. The next frontier uses AI to connect normal user behavior with attack behavior, sharpening detection with each event.
The White House’s latest executive order reframes cybercrime as a national security issue and puts email at the center. Discover why phishing remains the primary attack vector and how AI-native defenses can stop it.
See how attackers weaponized a legitimate vendor's Microsoft 365 account to deliver a French-language VEC attack that cleared every standard authentication check.
AI Phishing Coach helps mitigate human risk with a new dynamic scoring dashboard and realistic BEC/VEC simulations.
Attune 1.0 transforms detection with a unified behavioral intelligence architecture built for an AI-driven threat landscape.
Learn how explainable AI brings clarity to cloud email security, giving SOC teams insight into detection decisions and greater confidence in automated defenses.
Abnormal introduces Attune 1.0, new visibility and control capabilities, and advances in human risk management, marking the next evolution of behavioral security.
Abnormal’s revamped Email Productivity Dashboard makes it easy to measure graymail impact, track deployment, and export executive-ready reporting on hours saved, coverage, and trends.
Cybersecurity is shifting from reactive response to proactive, AI-powered defense. Learn how predictive resilience helps organizations outpace modern threats.
Abnormal AI heads to RSA Conference 2026 to showcase the Abnormal Behavior Platform. Join us for AI-driven security insights, BEC defense, and exclusive RSAC events.
Abnormal transforms every employee-reported email into automated remediation and personalized coaching without increasing SOC workload.
Learn why behavioral AI outperforms static rules in detecting account takeover, reducing false positives while uncovering sophisticated identity attacks.






























