Discover how the Abnormal Threat Intel team is able to track and categorize BEC attacks into threat groups and learn about the strategy we use to name the groups we identify.
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.