Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Today we released our H1 2024 Email Threat Report, which examines the threat landscape and dives into the latest evolution in phishing: QR code attacks.
Learn 6 common look-alike domain tactics, some of the ways attackers use look-alike domains, and steps you can take to reduce your risk.
Discover why Abnormal customers trust an AI-powered solution to protect their organizations from advanced email attacks.
Discover key cybersecurity strategies for protecting your organization against emerging email threats in 2024.
Financial services organizations saw rising invoice fraud and business email compromise in 2023. Discover the stats and how to protect financial enterprises.
Discover what you missed at Vision 2024 with insights from our investors, partners, and email security experts and learn how to watch the entire conference on demand.
Discover Abnormal's major product developments in 2023 and how they help businesses stay ahead of evolving cybersecurity threats.
Register for Abnormal's cybersecurity conference to hear from Kevin O’Leary, Keren Elazari, and the Secret Service, and get a head start on your ISC2 CPE credits.
As 2023 comes to a close, we wanted to take a look back and highlight the top 10 articles published by Abnormal this year.
As attackers learn how to bypass MFA, detecting and remediating compromised accounts is more important than ever. Here’s how Abnormal does it.
See how attackers are using generative AI in their email attacks to bypass email security solutions and trick employees.
As we close out 2023, we're excited to share a collection of our favorite customer quotes. Learn why enterprises across the globe trust Abnormal.
Join industry leaders and innovators for insights, cutting-edge technologies, and a keynote by Kevin O'Leary at this cybersecurity conference.
Explore the intricacies of this BazarCall phishing attack that uses a Google Form for heightened authenticity.
Abnormal now offers policy-free, adaptive graymail management, making it a compelling solution for Google users aiming to boost employee productivity.
Learn the biggest cybersecurity statistics of 2023—from the rise of gen AI to the staggering losses caused by BEC. Stay informed and protect your organization.
Discover how to increase SOC productivity in the new year with an AI-powered strategy.
This Disney+ scam email uses brand impersonation and personalization to send a convincing fake subscription charge notice.
As AI becomes more prevalent in the new year, discover how our experts believe the world will change—for both good and bad.
Account takeover allows threat actors to steal sign-in credentials and access an organization's network. Read some eye-popping stats about ATO cost and frequency.
Learn about the techniques, tools, and technologies we use to train the models that form the backbone of our vendor fraud detection.
Get the latest insights from the 2023 ISC2 Cybersecurity Workforce Study, including which skills are most sought-after, how careers have changed, and how AI is affecting the industry.
Hear about positive and malicious use cases of AI and how to protect against novel threats in this recap from Chapter 3 of our Convergence of AI + Cybersecurity series.
Attackers attempt to solicit fraudulent donations via cryptocurrency transfers under the guise of collecting donations for children in Palestine.
Discover How It All Works