Abnormal Blog
Keep up with the latest news in cybersecurity with insight from our team of experts.
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Learn how Abnormal uses natural language processing or NLP to protect organizations from phishing, account takeovers, and more.
Discover the top five ways hackers compromise accounts, from exploiting leaked API credentials to SIM swapping partnerships, and more. Learn how these techniques enable account takeover (ATO) and pose risks to enterprises.
Discover trends among modern SOC teams, including misaligned budgets, increased automation, unsatisfactory AI tools, staffing issues, and more.
Advanced attacks targeting state and local governments are increasing. Discover what our research revealed about this alarming trend.
Discover how industry experts view and are preparing for AI’s evolving role in cybersecurity.
Cybercriminals know that humans are your enterprise's biggest vulnerability and are successfully engaging with your employees at an alarming rate.
Explore how Abnormal’s AI Security Mailbox enhances cybersecurity by engaging and educating employees with personalized GenAI responses. Improve security awareness and streamline operations.
In the second installment of our quarterly look-back at malicious emails, we examine 5 more recent noteworthy attacks detected and stopped by Abnormal.
Attackers attempt to steal payment information by posing as UPS and FedEx and sending fake shipment notifications about a pending delivery.
Explore expert insights from Bernard Wright, CISO at ClearBank, on the evolving cybersecurity challenges and strategies to protect the financial sector.
Discover why 99% of reviewers are willing to recommend Abnormal Security on Gartner Peer Insights™.
Cybercriminals exploit stolen financial data to offer consumers heavily discounted travel deals. Learn how these email scams work and tips to avoid falling victim to them this summer travel season.
Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
Discover key insights gleaned from replacing 100+ SEGs for Abnormal customers.
Discover what our research uncovered about the European threat landscape and attack trends for organizations in the region.
Abnormal aims to provide superior detection of email attacks while also directly and indirectly influencing the security awareness of your employees.
Discover how cybercriminals obtain corporate data from brokers like ZoomInfo and Apollo to enable targeted business email compromise (BEC) attacks.
Discover how security leaders are protecting their organizations against account takeover with insights from our survey of 300 cybersecurity stakeholders.
Discover how Abnormal helped one organization detect the sophisticated tactics an attacker used to compromise an employee's email account.
Discover the dangers of cross-platform account takeover, the challenges of detecting this attack, and how to implement proactive protection against ATO.
Learn how cybercriminals use superficial disclaimers to deceive others while facilitating illegal activity on cybercrime forums.
Discover How It All Works