Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
To help ensure you have the opportunity to read the latest cybersecurity news and updates, we’ve compiled a few posts from the last quarter that you can use to improve security in your organization.
Learn about active defense, an innovative approach our threat intel team uses to understand and block business email compromise attacks.
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Limiting time-wasting email messages makes employees more productive. Here’s how innovative organizations are addressing the challenge.
Learn how threat actors execute email account takeovers, how they exploit compromised accounts, and what you can do to reduce your risk.
In this attack, threat actors impersonate a teacher to deliver Matanbuchus malware-as-a-service (MaaS) using a Google Drive link.
Excessive promotional mail, also known as graymail, is impacting productivity and employee morale. Here are 11 startling graymail statistics.
We’re committed to creating an environment in which young professionals can gain valuable experience to help them in their careers. Hear about the Abnormal internship program firsthand.
The number of ransomware attacks continued its downward trend in Q2 2022. Learn why and discover more about ransomware threat actors and targets.
This week, we released our H2 2022 Email Threat Report, which explores the latest email attack trends, including the rise of brand impersonation in phishing attacks.
Introducing Abnormal Intelligence—your go-to resource for expert insights into emerging cyber threats and email attack trends.
Email Productivity makes filtering out time-wasting emails a hands-free endeavor.
The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Discover How It All Works