Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Abnormal Security


Latest Content From Abnormal Security

Webcast: Vendors as Your Largest BEC Threat

by Abnormal SecurityJun 22, 2022

The tactics that worked for your business five years ago likely aren’t still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn’t emailing them about gift cards at 2:00 in the morning.

Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you’re prepared to defend against them.


Webcast: Ransomware and BEC in the Cyber Threat Landscape: Past vs. Present, Perception vs. Reality

by Abnormal SecurityMar 23, 2022

Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?

Join us to hear Crane Hassold, Director of Threat Intelligence at Abnormal Security, discuss the real threats in today’s landscape, and why ransomware is only one of your concerns. With full insight into the past, present, and future of the threat landscape, this webinar will provide you everything you need to understand what could be targeting your organization.


Webcast: Beyond Spam and Phishing: Emerging Email-based Threats

by Abnormal SecurityJan 18, 2022

Even as enterprises adopt real-time messaging tools and platforms, email remains the hub of enterprise communications. Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks. In this webinar, you’ll learn about different tactics adversaries employ to steal from enterprises, including business email compromise (BEC) and stealing customer information. You will gain insights into how to recognize and defend against complex social engineering techniques designed to break into email.