Why Abnormal
/
Products
/
Solutions
/
Customers
/
Resources
/
Company
/
See a Demo
Loading...
Resource Center
Discover the latest research and new insights from Abnormal.
Threat Reports
Compromising Campus Accounts: Attackers Harvest Credentials and Duo OTPs for Account Takeover
A phishing campaign targets universities, stealing credentials and Duo OTPs for real-time account takeover. Learn how it works and how to stop it.
Download Now
Analyst Research
Abnormal Named a Leader in The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025
Download Now
Analyst Research
Human-Centered AI: Redefining the Modern SOC
Download Now
Get the Latest Insights
Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.
Subscribe
Resource Types
All
Analyst Research
Customer Stories
Data Sheets
Industry Briefs
Podcasts
Product Demos
Threat Reports
Tools
Videos
Webinars
White Papers
Get your ISC2 credits with Abnormal. Select webinars and white papers qualify.
Analyst Research
See All Analyst Research
Abnormal AI Named a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security
Download Now
Human-Centered AI: Redefining the Modern SOC
Download Now
Abnormal Recognized as Customers’ Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for Email Security
Download Now
Abnormal Named a Leader in The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025
Download Now
Osterman Research: Using AI to Enhance Defensive Cybersecurity
Download Now
Osterman Research: Safeguarding Identity Security—We Need to Talk about MFA
Download Now
Threat Reports
See All Threat Reports
Compromising Campus Accounts: Attackers Harvest Credentials and Duo OTPs for Account Takeover
Download Now
Weaponizing Workplace Communications: How Videoconferencing Impersonation and AI Exploitation Enable Malicious ScreenConnect Deployment
Download Now
Read, Replied, Compromised: Data Reveals 44% Engagement Rate with VEC Attacks
Download Now
H1 2025 - Adversarial AI: Attacker Innovation Escalates Advanced Email Threats
Download Now
Targeting Microsoft ADFS: How Phishing Campaigns Bypass Multi-Factor Authentication to Enable Account Takeover
Download Now
Inbox Under Siege: 5 Email Attacks You Need to Know for 2025
Download Now
Data Sheets
See All Data Sheets
The Real ROI of Replacing a SEG with Behavioral AI
Read More
Abnormal AI for Mergers & Acquisitions
Read More
AI-Powered Protection Against Fraud and Waste
Read More
Maximize Microsoft 365 With Abnormal + SHI
Read More
Abnormal + CrowdStrike
Read More
Security Posture Management for Microsoft 365
Read More
White Papers
See All White Papers
Forrester Research: Deconstructing Human-Element Breaches
Download Now
CISO Guide to Misdirected Email Prevention
Download Now
2025 State of Misdirected Email Prevention
Download Now
CISO Guide to Malware and Ransomware
Download Now
ABX: Abnormal Behavior Technology
Download Now
How to Protect Against the Human Vulnerability: Using AI to Prevent Novel Socially-Engineered Attacks
Download Now
Customer Stories
See All Customer Stories
Behavioural AI Stars in Village Roadshow's Security Modernisation Strategy
Read More
Mercury Engineering Builds a Safer Supply Chain with Human Behaviour AI
Read More
Landmark Group Transforms Its Email Security Posture with Human Behaviour AI
Read More
Clatsop Community College Protects Staff and Students with Human Behavior AI
Read More
REA Group Partners With Abnormal AI to Secure Email and Improve Employee Experience
Read More
Revolution Medicines Guards Its Cancer Research and Patients With Abnormal
Read More
Webinars
See All Webinars
Securing the Future of Education: A CISO Fireside Chat with St. Petersburg College
Watch Now
Cybersecurity in the Classroom: Protecting K-12 Schools from Cybercrime
Watch Now
Cybersecurity Awareness in Action: How 44% of VEC Attacks Engage Employees
Watch Now
Exposing the Misconfigurations Attackers Love in Microsoft 365
Watch Now
Supercharged Deception: How AI Is Accelerating Social Engineering
Watch Now
Phishing 2.0: Duo Passcodes Under Siege in Higher Education
Watch Now
Podcasts
See All Podcasts
From Offense to Innovation: What AI Teaches Us About the Future of Cyber Defense with Dave Kennedy
Listen Now
The Science of Breaking In: How Curiosity Drives Cybersecurity with FC
Listen Now
Testing, Learning, Evolving: How Practice and Precision Strengthen the SOC with Marty McDonald
Listen Now
From Alerts to Automation: Lessons in SOC Resilience with Steven Dumolt
Listen Now
Leading the Pack: Human Ingenuity in the AI-Driven SOC With Lisa Tetrault
Listen Now
From Battlefield to Boardroom: Lessons in Cyber Leadership with Patti Titus
Listen Now
Product Demos
See All Product Demos
Al Data Analyst
Watch Now
About AI Phishing Coach
Watch Now
How Abnormal Uses AI to Stop Generative AI Attacks
Watch Now
Use Case: Chat App Attack - External
Watch Now
Use Case: Chat App Attack - Internal
Watch Now
Use Case: Third-Party App Attacks
Watch Now
Industry Briefs
See All Industry Briefs
Abnormal for K-12 School Systems
Read More
Abnormal for State and Local Government
Read More
Abnormal for Higher Education
Read More
Abnormal for Financial Services
Read More
Abnormal for Federal Government
Read More
Abnormal for Healthcare
Read More
Videos
See All Videos
Separating the Pretenders from the Contenders: Using AI in the SOC
Watch Now
An Abnormal Approach to Securing Human Behavior
Watch Now
Ethical Hacker Kevin Poulsen Demonstrates How Threat Actors Can Exploit Generative AI
Watch Now
Abnormal CEO Evan Reiser on AI-Powered Cybersecurity With the New York Stock Exchange
Watch Now
An Abnormal Conversation with Greylock Partners
Watch Now
An Abnormal Approach to Email Security
Watch Now
Tools
See All Tools
Modern Cloud Email Demands Modern Security
Learn More
Essential Security Awareness Training Kit
Learn More
Weaponized GPTs Are Redefining Email Attacks
Learn More
Beyond the Gateway: Unlocking Hidden Benefits With Abnormal AI
Learn More
Legacy SEGs Can't Stop Vendor Email Compromise
Learn More
Checklist: 10 Must-Ask Questions to Evaluate Cloud Email Security Solutions
Learn More
Discover New Attacks
See our latest research and full attack library for details on new and emerging email threats.
Visit Abnormal Intelligence
Discover How It All Works
See How Abnormal AI Protects Humans
Product Platform
About Abnormal AI
Get a Demo