Keep up with the latest news in cybersecurity with insight from our team of experts.
B EDU Duo MFA Threat Intel Report Blog
A phishing campaign targeting higher education steals credentials and Duo OTPs to compromise accounts, exfiltrate data, and launch lateral attacks.
Read More
B 1500x1500 MKT1042m Social graphics for Cybersecurity Awareness Month blog post
Happy Cybersecurity Awareness Month! Make sure your workforce is prepared to combat emerging threats all year with these 5 tips.
Read More
B SOC Productivity
Discover how AI transforms user-reported emails from a SOC burden into a security advantage, boosting efficiency, accuracy, and trust.
Read More
How AI Helped One Manager Cover
See how a manager with no coding background built an AI-powered system to automate workflows, boost SLA performance, and save 40+ hours weekly.
Read More
B Gov RAMP Announcement Blog
With GovRAMP Authorization, Abnormal AI extends trusted AI-native security to governments and schools nationwide.
Read More
Beyond Security Awareness Cover pptx 1
Traditional security training is broken. Discover how Abnormal AI Phishing Coach leverages AI-driven coaching to reduce human risk and stop modern phishing attacks.
Read More
B SOC Culture
Strong SOCs aren’t built once—they’re built daily. See how culture and recognition prevent burnout and boost resilience.
Read More
How Manual Triage Undercuts the Modern SOC Cover pptx
Manual email triage drains SOC capacity and delays response to real threats. Discover how an AI-powered abuse mailbox slashes review time by up to 95% and frees thousands of analyst hours annually.
Read More
B MKT1020g Convergence S5 Open Graphs Announcement Blog
Discover how AI is transforming both cyberattacks and defenses from experts on the frontlines of security innovation in our popular web series.
Read More
Pioneering Responsible AI Cover
Abnormal AI achieves ISO/IEC 42001:2023 certification, becoming an early adopter of the global standard for AI governance and risk management.
Read More
B Malware
Discover how generative AI is fueling smarter, stealthier malware—and why behavior-based defenses are critical to stopping these evolving threats.
Read More
B Salesloft Drift Breach Blog
The Salesloft Drift breach exploited OAuth to compromise Salesforce data across 700+ orgs, exposing SaaS integration and posture management risks.
Read More
B Microsoft Direct Send Abuse
Threat actors are abusing Microsoft Direct Send to spoof internal emails. See why legacy defenses fail and how Abnormal prevents these attacks.
Read More
B BEC
Learn why BEC keeps rising with AI and how CISOs can stop attacks before they reach inboxes.
Read More
Defensive AI Meets Cover pptx
As the battle between good AI and malicious AI plays out in cloud email environments, CISOs are turning to behavioral intelligence to keep pace.
Read More
B Anthropic Report Blog
Anthropic’s threat intelligence report reveals exploitation of Claude for AI-enabled attacks like vibe hacking. Learn why AI-native defenses are critical.
Read More
Email as the Adversary Foothold Cover
Major Federal cyber breaches share one overlooked constant: email. This post presents five case studies revealing how attackers exploited the inbox through phishing, credential theft, and forged tokens—and why behavioral, identity-aware AI delivers the decisive advantage over legacy defenses.
Read More
When Custom Rules Break Cover pptx
More rules mean more work—and more risk. See how behavioral AI flips the model by detecting threats without requiring constant manual tuning or rule maintenance.
Read More
B Screen Connect Abuse
Phishing attacks impersonate Zoom and Teams to deliver ScreenConnect, exploiting the legitimate IT tool for stealthy, persistent system access.
Read More
B SEG Replace
Discover how these security leaders modernized their security stack, saved time, and lowered security costs by replacing their SEG with Abnormal.
Read More
8 Threats Redefining CES Cover pptx
Discover the 8 threats reshaping cloud email security in 2025 and the AI-native capabilities SOC teams need to stay ahead of attackers.
Read More
Five 2025 Trends Every Banking
Explore five trends shaping email security for technical teams in 2025 and practical steps to help you stay ahead.
Read More
B Compromised Police Government Accounts
Cybercriminals are selling active .gov and .police accounts, enabling identity takeover, fraudulent subpoenas, and access to sensitive law enforcement systems.
Read More
IBM 2025 Data Breach Cover
Phishing and vendor email compromise are now among the costliest breach vectors, as the average U.S. data breach surpasses $10 million.
Read More
Loading...