Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
It’s IC3 Report week! In what has become an annual holiday for anyone that’s heavily involved in researching business email compromise (BEC) attacks, the FBI released its 2021 Internet Crime Report that details trends in various types of cybercrime activity over the past year.
Today, Abnormal released our H1 2022 Email Threat Report, focused on data from July to December 2021. Over the course of those six months, we tracked a relatively new form of cyber attack—phone fraud that starts via email.
Here at Abnormal, our machine learning models help us spot trends and abnormalities in customer data in order to catch and prevent cyberattacks.
The new navigation involved a significant functional and visual overhaul of the user interface. It includes a refined user experience divided into three design themes.
To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks.
Actors are now exploiting the customer contact form on websites to bypass email security and encourage BazarLoader downloads.
Phishing is one of the most common and costly cyberattacks in cybersecurity. But there isn't just one type of phishing attack.
At Abnormal Security, our channel partners are critical to our continued rocket-ship growth and we’re delighted to recognize the impact they have on our mutual customers and on our mission to stop cybercrime.
Looking at the overall volume trends, there have been two main spikes in ransomware activity over the last two years.
The dedication to our customers from across the company, from engineering to sales, from marketing to customer success, ensures that when you work with Abnormal, you receive the best experience possible—while stopping all of the attacks that bypass other solution
The new podcast features exclusive interviews with Fortune 500 technology leaders about innovation in the enterprise.
Email password leaks happen after a compromised account or a data breach. A single password leak can jeopardize an entire database. You need to adhere to password best practices with a strong email security program.
Higher education institutions continue to be prime targets for attack as cybercrimianls prey on unsuspecting students.
At Abnormal, we're constantly innovating, and we're thrilled to share with you our major Q1 Winter product release, which includes enhanced detection for a variety of attack types, including business email compromise, account takeover, malware, and more.
As part of our research, we dove into why ransomware has changed and how each variable influences the overall threat of ransomware in distinctly different ways.
Keeping your email secure starts with picking a secure email provider, and major email providers can fall short.
January 28th is Data Privacy Day, where individuals and organizations alike can take part in the international effort to safeguard privacy and data.
New research from the Abnormal Threat Intelligence team shows that ransomware delivery methods have evolved, payouts are growing in frequency and total cost, and there are more malicious actors participating in ransomware than ever before.
Abnormal's fundamental job is to detect malicious emails like phishing and business email compromise attacks and other malicious events, such as suspicious sign-ins that indicate an account has been hacked.
When the typical person thinks about cybercrime, they may think of ransomware or identity theft, or perhaps the ubiquitous Nigerian prince scams targeting their unsuspecting grandmother
Learn how customers have influenced the latest round of product enhancements to better protect your organization from email-borne threats.
As a growing startup, things are constantly changing. From our booming customer base to expanding product lines, Abnormal Security is quickly becoming familiar with the idea of scaling.
Abnormal’s relentless pursuit of innovation significantly improves the detection efficacy of hidden payloads in emails by an additional 5%.
Estimating both the time and cost to complete a task has been a continual challenge for engineering teams as long as I’ve been working in industry. Coordinating the complex interactions and execution task sequencing across multiple tasks and people is a complex, ever-evolving challenge, and one that most teams struggle with daily.
Discover How It All Works