Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
What did RSAC 2025 reveal about the next wave of cyberthreats—and the AI-powered tools to stop them? Abnormal’s Field CISO shares her top takeaways.
Discover how Abnormal AI accelerates developer velocity with its secure, in-house Model Context Protocol (MCP), integrating tools like GitHub and Jira directly into local environments to streamline workflows without compromising security.
Discover the measurable ROI of replacing your SEG with Abnormal—from 91% faster incident response to $703K in productivity savings.
Tool bloat is an easy win for hackers and a major integration headache for overstretched security teams. Platformisation could be the antidote to cyber complexity, closing the coverage gaps while dramatically easing the management of multiple security tools.
Can generative AI be manipulated for cybercrime? Our research shows how attackers can bypass safeguards in today’s top AI tools.
Discover the latest AI-powered innovations from Abnormal, including Quarantine Release, Enterprise Remediation Settings, URL Rewriting, and Misdirected Email.
Discover how Abnormal’s AI Data Analyst turns complex email security data into instant reports, clear insights, and board-ready presentations—no manual effort needed.
Discover how Abnormal transforms security training with personalized phishing simulations, real-time coaching, and fully autonomous program management.
Abnormal's latest product release delivers AI agents for security awareness training and data reporting, plus multiple no-cost upgrades to our Inbound Email Security product.
Verizon's 2025 Data Breach Investigations Report reveals how attackers continue to exploit human behavior. Here’s what defenders need to know.
The 2024 FBI IC3 Report confirms BEC remains a top cyber threat, driving billions in losses alongside crypto-enabled investment scams.
With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
Discover what Abnormal AI’s FedRAMP Moderate Authorization means for the public sector.
Learn how Abnormal leverages the latest AI developer tools to slash engineering time and streamline internal operations.
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Malicious AI is rewriting the rules of cybercrime. Learn how traditional GPTs are being exploited and why security teams need to act now.
Learn how Abnormal has employed Cursor to optimize our enterprise codebase for LLMs, automate project rules, and build a security-first AI dev culture.
Learn how XFiles uses fileless malware, Cloudflare Turnstile widgets, and phishing emails to steal login details, cryptocurrency wallets, and access to corporate systems.
Understand essential email security metrics that reveal the strength of your protection and highlight areas for improvement in your security program.
Discover How It All Works