While cybercriminals can (and do) infiltrate organizations by exploiting software vulnerabilities and launching brute force attacks, the most direct—and often the most effective—route is via the inbox. As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attackers.
And it seems that, unfortunately, cybercriminals aren’t lacking when it comes to identifying new ways to sneak in. Abnormal Security’s Field CISO, Mick Leach, will discuss some of the sophisticated threats we anticipate escalating in the coming year—including cryptocurrency fraud, AI-generated business email compromise, and more.
Interested in sponsoring an issue of Resilient Cyber?
This includes reaching over 7,000 subscribers, ranging from Developers, Engineers, Architects, CISO’s/Security Leaders and Business Executives
Reach out below!
As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attackers. And it seems that, unfortunately, cybercriminals aren’t lacking when it comes to identifying new ways to sneak in.
Abnormal Security’s white paper, Inbox Under Siege: 5 Email Attacks You Need to Know for 2025, explores some of the sophisticated threats we anticipate escalating in the coming year and examines real-world examples of attacks Abnormal customers received in 2024.
Mick and I dove into a lot of great topics, including:
The evolution of email based attacks and why traditional tooling may fall short
How attackers are leveraging GenAI and LLM’s to make more compelling email-based attacks
How defenders can utilize AI to improve their defensive capabilities
The role of tooling such as Secure Email Gateways and more, and how they still play a role but fail to meet the latest threat landscape
How Abnormal is tacking email-based attacks and the outcomes they are helping customers achieve with streamlined integration and use
Share this post