chat
expand_more

Keep up with the latest news in cybersecurity with insight from our team of experts.
Blog purple diagonals
Credential phishing attacks are not new, and impersonating Microsoft is well-known at this point. However, this attack is unique because the attacker was not simply asking for email credentials. Instead, the...
Read More
Blog green glass building
Executive impersonation is one of the most prevalent forms of business email compromise because it is typically easy to do. The attacker only needs to know the name and job type of a high-profile executive, ...
Read More
Discover How It All Works

See How Abnormal AI Protects Humans