Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Discover the risk of these image-based QR attacks and how Abnormal’s AI-native detection system protects you.
Learn how CISOs are using good AI to fight bad AI in this recap from Chapter 2 of our Convergence of AI + Cybersecurity series.
We're excited to share that we've integrated with GPT-4, a state-of-the-art LLM developed by OpenAI, to enhance the detection of sophisticated email attacks.
To understand how organizations are responding to the evolving threat of AI, we surveyed 300 cybersecurity leaders. Here are a few key takeaways.
Generative AI tools help bad actors craft sophisticated attacks in seconds. Learn why CISOs are investing in AI-native cybersecurity solutions to fight back.
Interested in charting a course toward becoming a CISO? Here are 12 tips to help you on your journey.
See how cyber threats have evolved over the past two decades as we celebrate 20 years of Cybersecurity Awareness Month.
See how advanced attacks are able to bypass MFA and how you can protect your organization.
Discover how Abnormal and Valimail work together to provide customers with a comprehensive, well-integrated solution that protects their businesses from advanced attacks.
Learn how cybercriminals use AI for targeted social engineering attacks in this recap from Chapter 1 of our Convergence of AI + Cybersecurity series.
Stay secure by staying informed during the 20th anniversary of Cybersecurity Awareness Month. Explore 10 eye-opening statistics about advanced email attacks.
Email attacks like BEC against the healthcare industry are on the rise in 2023. Protect yourself with sophisticated cloud-native email security.
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
John Hoyt, CISO at Clemson University, shares his take on the unique cybersecurity challenges of higher education and how Abnormal Security can help.
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
This company has the best cybersecurity product I’ve ever seen, and we’re primed for a future where AI is the focus. Here’s my thoughts on why.
Join us for this series, featuring black hat hacker Kevin Poulsen and AI visionaries from OpenAI and CrowdStrike, presented by Fast Company.
Discover how FraudGPT works, how it differs from other generative AI models, and the impact it has on cybersecurity.
It’s 2023 but not much has changed in phishing, as brand impersonation remains an attacker favorite.
In its first year, Email Productivity transformed employee productivity by removing promotional emails from inboxes. Discover our main takeaways, investments we've made in the product, and what to expect next.
As attackers leverage AI to improve their efforts, Osterman Research finds that organizations are prioritizing AI-enabled security to protect their email environments.
Business email compromise (BEC) and vendor email compromise (VEC) are sophisticated email attacks that cost businesses millions. Protect yourself with Abnormal Security.
Discover How It All Works