Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Credential phishing attacks are not new, and impersonating Microsoft is well-known at this point. However, this attack is unique because the attacker was not simply asking for email credentials. Instead, the...
Executive impersonation is one of the most prevalent forms of business email compromise because it is typically easy to do. The attacker only needs to know the name and job type of a high-profile executive, ...
Discover How It All Works

