chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B 08 14 23 Evans Blog Post v2
Abnormal crossed the $100M ARR threshold in only four years, but we’re not stopping there. Here’s our vision for the future of AI-powered cybersecurity.
Read More
B 8 15 23 Glossary
Explore this glossary of need-to-know artificial intelligence terms to better understand AI and its uses.
Read More
B 8 10 23 Recap
Discover all of Abnormal's latest integrations across apps like Slack, Zoom, and Microsoft Teams extending your email-like protection across the cloud environment.
Read More
B 8 8 23 SEG Web
A secure email gateway (SEG) simply cannot defend your cloud email platform. Stop advanced threats with Abnormal Security. Here's what our customers have to say about ditching their SEGs.
Read More
B 8 7 23 Replace SEG
Discover the top three reasons organizations should replace their traditional SEG with a modern solution to protect their cloud email environment from malicious actors and emerging threats.
Read More
B 8 1 23 ABM
See how Abuse Mailbox Automation provides organizations with an extra layer of security, helping security teams automate the user-reported phishing email workflow and identify malicious emails.
Read More
B 7 31 23 threatblog
Third-party apps present increased cyberattack risks to email environments via app permissions. Traditional email can't handle the challenge, but Abnormal can.
Read More
B 7 27 23 ATO
Explore the evolution of an account takeover in the cloud email environment and discover how you can protect your organization from future compromise.
Read More
B 7 25 23 IBM
IBM's Cost of a Data Breach Report 2023 says the global average data breach cost in 2023 was $4.45 million. Protect yourself with Abnormal Security for cloud email.
Read More
VEC attacks blog cover
Discover how one threat actor compromised five vendor organizations to commit the same invoice fraud attack against more than a dozen victims.
Read More
B 7 24 23 Worm GPT
Discover the threat of WormGPT, a powerful blackhat form of generative AI for cybercriminals, and how it differs from ChatGPT.
Read More
B 7 20 23 User Flow
Discover how an automated user-reported email workflow can improve productivity and better secure your cloud email environment.
Read More
B 7 19 23 Fed Email Breach
Discover key cybersecurity takeaways from last week’s email breach on federal agencies by a Chinese APT group.
Read More
B 7 14 23 Gen A Ipng
Generative AI tools like ChatGPT and Google Bard are already being used by cybercriminals for BEC attacks, phishing, and malware. Here's how to combat email-based attacks.
Read More
B 1500x1500 Higher Ed Blog Images
Colleges, universities, and higher education facilities are hot targets for cybercriminals looking to steal personal data and intellectual property. Defend yourself.
Read More
Fbi 50 billion bec cover
The FBI IC3 identified $51 billion in exposed losses due to business email compromise from 2013 to 2022—an increase from previous estimations.
Read More
B 7 3 23 Q2 Blogs
Here are some of our top cybersecurity blog posts from the last quarter you might have missed.
Read More
B 6 28 23 Cloud Email Tips
Cloud office platforms like Microsoft 365 and Google Workspace need strong cybersecurity solutions. Shape your cloud email security strategy with these ten tips.
Read More
B 6 27 23 Chat Attacks
ChatGPT and other generative AI tools can be used to craft highly convincing phishing emails and social engineering scams. Here's how to spot them and fight back.
Read More
B 6 16 23 Platform
Discover how the Abnormal dashboard offers visibility into your email environment to better protect against potential threats.
Read More
B 6 7 23 API
Learn about the distinct functionalities of transport rule-based and API-based solutions to make informed decisions about your security architecture.
Read More
Gen AI blog cover
New attacks stopped by Abnormal show how attackers are using ChatGPT and similar tools to create more realistic and convincing email attacks.
Read More
B 6 8 23 Collab
Business collaboration tools help employees with productivity and communication. But they can also present a number of cybersecurity risks for your business.
Read More
B Verizon
Discover the biggest takeaways about business email compromise and social engineering from the 2023 Verizon Data Breach Investigations Report (DBIR).
Read More
Discover How It All Works

See How Abnormal AI Protects Humans