abnormalsecurity.com
Open in
urlscan Pro
76.76.21.21
Public Scan
URL:
https://abnormalsecurity.com/resources/financial-supply-chain-compromise?form=success
Submission: On June 22 via api from US — Scanned from DE
Submission: On June 22 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="EmbeddedForm__form">
<div class="EmbeddedForm__field mb-4">
<div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
<div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">First Name</div><input name="firstName" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
</label></div>
</div>
<div class="EmbeddedForm__field mb-4">
<div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
<div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Last Name</div><input name="lastName" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
</label></div>
</div>
<div class="EmbeddedForm__field mb-4">
<div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
<div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Email Address</div><input name="email" required="" type="email" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
</label></div>
</div>
<div class="EmbeddedForm__field mb-4">
<div class="EmbeddedForm__field mb-4 text-black-01 text-white-01"><label class="EmbeddedForm__labelWrapper block bg-white-01 bg-white-01/10 text-white-01">
<div class="EmbeddedForm__label text-xs opacity-50 px-4 pt-2 text-current">Company Name</div><input name="company" required="" type="text" class="EmbeddedForm__input form-input w-full pt-0 bg-transparent" value="">
</label></div>
</div>
<div class="EmbeddedForm__field mb-4">
<div><label class="flex items-center"><input name="Email_Opt_In__c" type="checkbox" class="form-checkbox" value="">
<div class="block ml-4">I would like to receive email updates from Abnormal Security. By submitting this form you agree to the terms listed in our
<a href="https://abnormalsecurity.com/privacy-policy/" target="_blank" id="privacypolicy">privacy policy</a>.</div>
</label></div>
</div>
<div class="EmbeddedForm__field mb-4"><input name="leadSource" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Organic Website"></div>
<div class="EmbeddedForm__field mb-4"><input name="campaign" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="7015G000000JnLtQAK"></div>
<div class="EmbeddedForm__field mb-4"><input name="CStatus" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Downloaded Report"></div>
<div class="EmbeddedForm__field mb-4"><input name="contentStage" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Stage 3"></div>
<div class="EmbeddedForm__field mb-4"><input name="marketingRelease" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Processing"></div>
<div class="EmbeddedForm__field mb-4"><input name="Lead_Source_Detail__c" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02"
value="This person downloaded our Supply Chain Compromise Threat Intel Report, "From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise""></div>
<div class="EmbeddedForm__field mb-4"><input name="flexField" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
<div class="EmbeddedForm__field mb-4"><input name="utm_campaign" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="7015G000000JnLtQAK"></div>
<div class="EmbeddedForm__field mb-4"><input name="utm_content" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
<div class="EmbeddedForm__field mb-4"><input name="utm_medium" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
<div class="EmbeddedForm__field mb-4"><input name="utm_source" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value="Direct"></div>
<div class="EmbeddedForm__field mb-4"><input name="utm_term" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
<div class="EmbeddedForm__field mb-4"><input name="engagementDetailTemp" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02"
value="This person downloaded our Supply Chain Compromise Threat Intel Report, "From CEO Fraud to Vendor Fraud: The Shift to Financial Supply Chain Compromise""></div>
<div class="EmbeddedForm__field mb-4"><input name="GCLID__c" type="hidden" class="EmbeddedForm__hiddenInput form-input w-full bg-white-02" value=""></div>
<div class="EmbeddedForm__buttons"><button type="submit" class="EmbeddedForm__button flex items-center justify-center ml-auto h-10 px-5 text-white-01 border hover:bg-white-01 hover:text-black-01 hover:border-white-01 rounded-sm">Download</button>
</div>
</form>
Text Content
Why Abnormal/Products/Solutions/Customers/Partners/Resources/Careers/ See a Demo Resource Center FROM CEO FRAUD TO VENDOR FRAUD: THE SHIFT TO FINANCIAL SUPPLY CHAIN COMPROMISE Threat Intel ReportsSupply Chain Compromise Share via: LinkedIn Facebook Twitter For years, executives were the go-to impersonated party in business email compromise (BEC) attacks. Recently, however, attackers have adjusted their strategies—opting to impersonate third-party vendors and suppliers instead. In January 2022, the number of attacks impersonating third parties surpassed those impersonating internal employees for the first time. This trend has continued each month since, with third-party impersonations making up 52% of all BEC attacks in May 2022. Download the threat intelligence report for valuable insight into financial supply chain compromise, including: * What the four types of supply chain compromise look like * How threat actors impersonate vendors in two specific ways * Why BEC attacks impersonating executives have decreased 17% year-over-year FILL OUT THE FORM TO ACCESS THE FULL REPORT. After reading this report, you are eligible for 1 CPE credit through (ISC)². DOWNLOAD NOW First Name Last Name Email Address Company Name I would like to receive email updates from Abnormal Security. By submitting this form you agree to the terms listed in our privacy policy. Download SEE THE ABNORMAL SOLUTION TO THE EMAIL SECURITY PROBLEM Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security. See a Demo RELATED RESOURCES Supply Chain CompromiseWebinars Protecting Yourself From Your Supply Chain: A CISO Panel on Email Security While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy. Watch Now Supply Chain CompromiseThreat Reports Q1 2021: The Rising Threat of Vendor Email Compromise Read the Q1 2021 threat report to learn the latest on vendor email compromise, including which scams are most successful and why the volume of attacks has grown so significantly. Download Now Account TakeoverBusiness Email CompromiseSupply Chain CompromiseThreat Reports Q2 2021: High-Profile Socially-Engineered Email Attacks Drive Record-High Employee Engagement & Fraud Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement. Download Now Account TakeoverBusiness Email CompromiseSupply Chain CompromiseThreat Reports Q3 2021: Account Takeover Attempts Rise 671%, Reaching Unprecedented Levels Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts. Download Now Supply Chain CompromiseWhite Papers CISO Guide to Supply Chain Compromise Supply chain compromise attacks can cause substantial financial loss through invoice or payment fraud. Learn how and why attackers leverage compromised accounts from vendors to launch attacks that are specifically designed to bypass traditional email security. Download Now Why Abnormal Products Integrated Cloud Email Security Inbound Email Protection Account Takeover Protection SOC Automation Additional Platform Capabilities Solutions For Microsoft Office For Google Workspace Credential Phishing Malware and Ransomware Supply Chain Compromise Invoice and Payment Fraud Spam and Graymail Business Email Compromise Cloud Account Takeover Displace Your Secure Email Gateway (SEG) Customers Customers Overview Customer Stories Gartner Peer Insights Partners Microsoft + Abnormal Partner Portal Technology Partners Resource Center Resource Center Abnormal Blog Engineering Blog Attack Stories Customer Support Company About Upcoming Events Careers Team Machine Learning at Abnormal Abnormal Engineering Spotlight News & Press Abnormal Business School Abnormal Precisely Stops Zero-Day Email Attacks ©2022 Abnormal Security Corp. All rights reserved. Responsible DisclosureDPATrust CenterStatusPrivacy PolicyTerms of UseContact UsSitemap