chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
B Salesloft Drift Breach Blog
The Salesloft Drift breach exploited OAuth to compromise Salesforce data across 700+ orgs, exposing SaaS integration and posture management risks.
Read More
B Microsoft Direct Send Abuse
Threat actors are abusing Microsoft Direct Send to spoof internal emails. See why legacy defenses fail and how Abnormal prevents these attacks.
Read More
B BEC
Learn why BEC keeps rising with AI and how CISOs can stop attacks before they reach inboxes.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B Anthropic Report Blog
Anthropic’s threat intelligence report reveals exploitation of Claude for AI-enabled attacks like vibe hacking. Learn why AI-native defenses are critical.
Read More
Email as the Adversary Foothold Cover
Major Federal cyber breaches share one overlooked constant: email. This post presents five case studies revealing how attackers exploited the inbox through phishing, credential theft, and forged tokens—and why behavioral, identity-aware AI delivers the decisive advantage over legacy defenses.
Read More
When Custom Rules Break Cover pptx
More rules mean more work—and more risk. See how behavioral AI flips the model by detecting threats without requiring constant manual tuning or rule maintenance.
Read More
B Screen Connect Abuse
Phishing attacks impersonate Zoom and Teams to deliver ScreenConnect, exploiting the legitimate IT tool for stealthy, persistent system access.
Read More
B SEG Replace
Discover how these security leaders modernized their security stack, saved time, and lowered security costs by replacing their SEG with Abnormal.
Read More
8 Threats Redefining CES Cover pptx
Discover the 8 threats reshaping cloud email security in 2025 and the AI-native capabilities SOC teams need to stay ahead of attackers.
Read More
Five 2025 Trends Every Banking
Explore five trends shaping email security for technical teams in 2025 and practical steps to help you stay ahead.
Read More
B Compromised Police Government Accounts
Cybercriminals are selling active .gov and .police accounts, enabling identity takeover, fraudulent subpoenas, and access to sensitive law enforcement systems.
Read More
IBM 2025 Data Breach Cover
Phishing and vendor email compromise are now among the costliest breach vectors, as the average U.S. data breach surpasses $10 million.
Read More
Inside the Fault Tolerant Scoring Cover
How Abnormal engineered a resilient, self-healing AI detection platform that maintains high precision even when dependencies fail.
Read More
B Cyber Savvy BSI
Discover how BSI CISO Mike Pitman is advancing cyber resilience in the face of AI threats, zero-day vulnerabilities, and budget constraints—while supporting a sustainable future for security.
Read More
B SOC Unlocked S 2
Discover key takeaways from the Season 2 premiere of SOC Unlocked, featuring Patti Titus, Field CISO at Abnormal AI, as she shares insights on cyber leadership, human risk, AI, and building a resilient security career.
Read More
B AI Trust
Discover why transparency is essential to AI adoption in the SOC. Learn how trust, governance, and model explainability are shaping the future of cybersecurity operations.
Read More
Black Hat Product Launch Cover
Abnormal AI announces Security Posture Management for Microsoft 365, international expansion, and Email Security product innovations at Black Hat 2025.
Read More
Security Posture Management M365
Secure your Microsoft 365 environment with AI-driven Security Posture Management guided by threat intelligence. Detect and remediate misconfigurations before attackers weaponize them to gain access or escalate privileges.
Read More
Hard Truths Ai That Works Cover
Catch up on major insights, top sessions, and full on-demand access from Abnormal Innovate: Summer Update, the summit on the future of AI email security.
Read More
Weaponized Trust pptx
Vendor email compromise (VEC) exploits trusted partners to defraud organizations. Learn how AI-powered email security detects supply chain threats other tools miss.
Read More
B College Athletics Email Attacks
College athletic programs are prime targets for email attacks. Learn how threat actors exploit them—and how Abnormal AI stops attacks before they spread.
Read More
B Human SOC AI
Discover how human-centered AI is transforming the modern SOC—reducing analyst burnout, improving threat detection, and enabling more strategic operations.
Read More
Tool Shell Cover
A newly discovered zero-day is affecting on-prem SharePoint environments. Here’s what CISOs need to know.
Read More
Discover How It All Works

See How Abnormal AI Protects Humans