Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Discover Abnormal's major product developments in 2023 and how they help businesses stay ahead of evolving cybersecurity threats.
Register for Abnormal's cybersecurity conference to hear from Kevin O’Leary, Keren Elazari, and the Secret Service, and get a head start on your ISC2 CPE credits.
As 2023 comes to a close, we wanted to take a look back and highlight the top 10 articles published by Abnormal this year.
As attackers learn how to bypass MFA, detecting and remediating compromised accounts is more important than ever. Here’s how Abnormal does it.
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
As we close out 2023, we're excited to share a collection of our favorite customer quotes. Learn why enterprises across the globe trust Abnormal.
Join industry leaders and innovators for insights, cutting-edge technologies, and a keynote by Kevin O'Leary at this cybersecurity conference.
Explore the intricacies of this BazarCall phishing attack that uses a Google Form for heightened authenticity.
Abnormal now offers policy-free, adaptive graymail management, making it a compelling solution for Google users aiming to boost employee productivity.
Learn the biggest cybersecurity statistics of 2023—from the rise of gen AI to the staggering losses caused by BEC. Stay informed and protect your organization.
Discover how to increase SOC productivity in the new year with an AI-powered strategy.
This Disney+ scam email uses brand impersonation and personalization to send a convincing fake subscription charge notice.
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Abnormal product enhancements improve detection against quishing and MFA bypass in conjunction with deeper insights, visibility, and data correlation.
Discover how a new data ingestion integration from Abnormal Security and CrowdStrike helps organizations protect their data more efficiently while providing comprehensive visibility.
Get an in-depth look at how Abnormal leverages the latest AI technologies to bolster our security capabilities, including fine-tuning our own large language models (LLMs).
Attackers capitalize on the Bittrex bankruptcy by targeting customers with a convincing credential phishing attack.
See why acquiring an API-enabled email security startup isn't enough to improve a secure email gateway's detection capabilities.
Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.
Discover How It All Works