News

Abnormal AI
abnormal. ai > blog > athr-ai-voice-phishing-toad-attacks

How ATHR Automates the Full TOAD Attack Chain with AI

4+ day, 4+ hour ago  (816+ words) A cybercrime platform called ATHR uses AI vishing agents, credential harvesting panels, and built-in phishing mailers to execute and scale TOAD attacks. Aaron Orchard, Callie Baron, Piotr Wojtyla Telephone-oriented attack delivery (TOAD) remains an especially effective way to get past…...

Abnormal AI
abnormal. ai > blog > venom-phishing-campaign-mfa-credential-theft

Meet VENOM: The Phaa S Platform That Neutralizes MFA

1+ week, 2+ day ago  (791+ words) A previously undocumented phishing platform is targeting CEOs and CFOs by name, exploiting live Microsoft authentication to establish persistent access. Aaron Orchard, Alex Blinov, Callie Baron, Piotr Wojtyla, Ryan Devendorf In this post, we walk through what makes this campaign…...

Abnormal AI
abnormal. ai > blog > iran-aligned-cyber-operations-email-threats

Tracking Iran-Aligned Cyber Operations Following U. S. -Israel Strikes

3+ week, 5+ day ago  (888+ words) Iran-aligned groups are conducting cyber operations after strikes by the U. S. and Israel. Explore their tactics and how Abnormal can strengthen defenses. While Abnormal AI is not seeing an indiscriminate surge in email attacks at scale, Iran-aligned threat actors are conducting…...

Abnormal AI
abnormal. ai > blog > microsoft-teams-security-attachment-scanning-auto-remediation

Inside Microsoft Teams Messaging Security: Attachment Scanning and

1+ mon, 2+ hour ago  (813+ words) Protect Microsoft Teams from malicious files and phishing. Learn how real-time attachment scanning and auto-remediation reduce risk and dwell time. Microsoft Teams is now a direct delivery channel for malicious files and links, and security teams need real-time attachment scanning…...

Abnormal AI
abnormal. ai > products > whats-new > weekly-abnormal-detection-enhancements-5

Weekly Abnormal Detection Enhancements

2+ mon, 1+ week ago  (79+ words) abnormal. ai Weekly Abnormal Detection Enhancements A weekly summary of detection enhancements delivered by the Abnormal engineering team. Weekly Detection Enhancements - Week of February 6 Enhanced detection accuracy for email impersonation attacks Expanded detection of misdirected emails by analyzing additional username…...

Abnormal AI
abnormal. ai > blog > cyera-email-data-security-partnership

Abnormal AI and Cyera Partner to Advance Email Security and Data Risk

3+ mon, 6+ day ago  (558+ words) Abnormal AI's and Cyera's AI-native partnership advances email security, identity protection, and data loss prevention (DLP) to stop AI-driven attacks and reduce data exposure across cloud environments. This partnership marks an important step toward delivering a unified, AI-driven security model…...

Abnormal AI
abnormal. ai > blog > abnormal-crowdstrike-malware-investigation

Announcing Abnormal's Integration with Crowd Strike's Malware Analysis Agent

3+ mon, 2+ week ago  (273+ words) Understanding the true risk of suspicious attachments requires more than basic detection. Traditional email security tools often rely on static rules or known indicators, which can miss novel, targeted, or evasive malware. Abnormal's AI-driven approach models normal communication and attachment…...

Abnormal AI
abnormal. ai > blog > realistic-phishing-simulations-training

This Is Not A Drill: Phishing Simulations That Behave Like Real-World Attacks

3+ mon, 2+ week ago  (338+ words) AI Phishing Coach delivers realistic phishing simulations using API-first delivery and lookalike domains to improve engagement and training outcomes. Phishing simulations only work when employees treat them like real emails. The moment a message feels like a test because it…...

Abnormal AI
abnormal. ai > blog > behavior-based-ai-vs-rule-based-email-security

Inside Abnormal's Behavioral AI: Moving Beyond Rules in Email Security

3+ mon, 3+ week ago  (859+ words) Learn why behavior-based AI outperforms static rules in modern email security, reducing false positives while detecting sophisticated attacks. The most dangerous emails today are indistinguishable from legitimate business communication. Attackers mirror an organization's tone, timing, and workflows so closely that…...