Resilient Cyber
Resilient Cyber Podcast
Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025
0:00
Current time: 0:00 / Total time: -31:30
-31:30

Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025

While cybercriminals can (and do) infiltrate organizations by exploiting software vulnerabilities and launching brute force attacks, the most direct—and often the most effective—route is via the inbox. As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attackers.

And it seems that, unfortunately, cybercriminals aren’t lacking when it comes to identifying new ways to sneak in. Abnormal Security’s Field CISO, Mick Leach, will discuss some of the sophisticated threats we anticipate escalating in the coming year—including cryptocurrency fraud, AI-generated business email compromise, and more.


Thanks for reading the Resilient Cyber Newsletter! Subscribe for FREE and join 8,000+ readers to receive weekly updates with the latest news across AppSec, Leadership, AI, Supply Chain and more for Cybersecurity


Interested in sponsoring an issue of Resilient Cyber?

This includes reaching over 7,000 subscribers, ranging from Developers, Engineers, Architects, CISO’s/Security Leaders and Business Executives

Reach out below!

-> Contact Us! <-


As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attackers. And it seems that, unfortunately, cybercriminals aren’t lacking when it comes to identifying new ways to sneak in.

Abnormal Security’s white paper, Inbox Under Siege: 5 Email Attacks You Need to Know for 2025, explores some of the sophisticated threats we anticipate escalating in the coming year and examines real-world examples of attacks Abnormal customers received in 2024.

Get Your Copy


Mick and I dove into a lot of great topics, including:

  • The evolution of email based attacks and why traditional tooling may fall short

  • How attackers are leveraging GenAI and LLM’s to make more compelling email-based attacks

  • How defenders can utilize AI to improve their defensive capabilities

  • The role of tooling such as Secure Email Gateways and more, and how they still play a role but fail to meet the latest threat landscape

  • How Abnormal is tacking email-based attacks and the outcomes they are helping customers achieve with streamlined integration and use

Discussion about this podcast