Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
How Abnormal engineered a resilient, self-healing AI detection platform that maintains high precision even when dependencies fail.
Discover how BSI CISO Mike Pitman is advancing cyber resilience in the face of AI threats, zero-day vulnerabilities, and budget constraints—while supporting a sustainable future for security.
Discover key takeaways from the Season 2 premiere of SOC Unlocked, featuring Patti Titus, Field CISO at Abnormal AI, as she shares insights on cyber leadership, human risk, AI, and building a resilient security career.
Discover why transparency is essential to AI adoption in the SOC. Learn how trust, governance, and model explainability are shaping the future of cybersecurity operations.
Abnormal AI announces Security Posture Management for Microsoft 365, international expansion, and Email Security product innovations at Black Hat 2025.
Secure your Microsoft 365 environment with AI-driven Security Posture Management guided by threat intelligence. Detect and remediate misconfigurations before attackers weaponize them to gain access or escalate privileges.
Catch up on major insights, top sessions, and full on-demand access from Abnormal Innovate: Summer Update, the summit on the future of AI email security.
Vendor email compromise (VEC) exploits trusted partners to defraud organizations. Learn how AI-powered email security detects supply chain threats other tools miss.
College athletic programs are prime targets for email attacks. Learn how threat actors exploit them—and how Abnormal AI stops attacks before they spread.
Discover how human-centered AI is transforming the modern SOC—reducing analyst burnout, improving threat detection, and enabling more strategic operations.
A newly discovered zero-day is affecting on-prem SharePoint environments. Here’s what CISOs need to know.
Abnormal AI has been named a 2025 Gartner® Peer Insights™ Customers’ Choice for Email Security Platforms, based entirely on feedback from IT and security professionals. Learn how real users rated Abnormal across key criteria including deployment, support, and product capabilities.
New research reveals predictable seasonal cybersecurity patterns in retail. Discover when attacks are most prevalent and how to synchronize defenses with threat cycles.
Discover how multi-party attacks unfold and how to stop them before they cause damage to your organization.
Explore how Abnormal AI rapidly engineered AI Phishing Coach, a hyper-personalized training platform, by leveraging GenAI, internal developer tools, and an AI-first build process designed for speed and scale.
Join Abnormal Innovate: Summer Update on July 17 to explore the future of AI-powered email security with bite-sized sessions, expert insights, and exclusive product reveals.
At Abnormal AI, detecting malicious behavior at scale means aggregating vast volumes of signals in realtime and batch. This post breaks down how we implemented the Signals DAG across both systems to achieve consistency, speed, and detection accuracy at scale.
Discover how modern CISOs are evolving security awareness training from a compliance checkbox into a strategic, AI-powered program that drives behavior change and builds a security-first culture.
Regional analysis of 1,400+ organizations reveals how geography shapes email security risks. See which regions are most vulnerable to VEC vs BEC.
Discover how healthcare security leaders are defending against AI-powered threats. Learn why identity and email are the new frontlines—and what it takes to protect the human element.
Explore real phishing attacks that use HTML and JavaScript to bypass defenses and learn what makes these emails so hard to detect.
Brand-specific phishing kits are replacing generic templates. Learn how these custom phishing kits enable sophisticated impersonation attacks.
Explore 10 key questions to evaluate cloud email security solutions and uncover how AI-native behavioral intelligence can stop today’s most advanced email threats.
Attacks rarely come through the front door anymore, and today’s actors use normal-sounding communications from legitimate suppliers as entry points. Behavioural AI can spot wider anomalies that legacy defences miss.























