Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Discover how an automated user-reported email workflow can improve productivity and better secure your cloud email environment.
Discover key cybersecurity takeaways from last week’s email breach on federal agencies by a Chinese APT group.
Discover how these security leaders modernized their security stack, saved time, and lowered security costs by replacing their SEG with Abnormal.
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Colleges, universities, and higher education facilities are hot targets for cybercriminals looking to steal personal data and intellectual property. Defend yourself.
The FBI IC3 identified $51 billion in exposed losses due to business email compromise from 2013 to 2022—an increase from previous estimations.
Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
Cloud office platforms like Microsoft 365 and Google Workspace need strong cybersecurity solutions. Shape your cloud email security strategy with these ten tips.
ChatGPT and other generative AI tools can be used to craft highly convincing phishing emails and social engineering scams. Here's how to spot them and fight back.
Discover how the Abnormal dashboard offers visibility into your email environment to better protect against potential threats.
Learn about the distinct functionalities of transport rule-based and API-based solutions to make informed decisions about your security architecture.
New attacks stopped by Abnormal show how attackers are using ChatGPT and similar tools to create more realistic and convincing email attacks.
Business collaboration tools help employees with productivity and communication. But they can also present a number of cybersecurity risks for your business.
Discover the biggest takeaways about business email compromise and social engineering from the 2023 Verizon Data Breach Investigations Report (DBIR).
Businesses need to stay ahead of malicious apps, social engineering, and more to keep their emails safe.
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to phishing attacks.
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Discover how Abnormal secures your Slack and keeps collaborative apps from becoming entry points for attackers.
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
Discover How It All Works