Loading...

The way Abnormal detects vendor email compromise attacks stands out. When a malicious actor took over an ongoing vendor conversation, we could see how Abnormal assessed the change of context, the slight nuances in the way the language shifted, the addition of a file with different bank details, and the fact that the attacker interjected an email address into the CC field. I’ve never seen these things detected by a traditional SEG.
— Jonny Concannon, Group Information Security Manager, Boohoo