AI-Based Attacks,
Artificial Intelligence & Machine Learning,
Fraud Management & Cybercrime
Evan Reiser, CEO of Abnormal AI, Speaks on Personalized Phishing Training and Behavioral Anomalies
Evan Reiser, CEO of Abnormal AI, which recently transitioned from Abnormal Security, asserts that advancements in artificial intelligence have significantly transformed security awareness training. The focus has shifted from traditional, generalized campaigns to personalized and automated initiatives that are both relevant and effective.
Reiser emphasized that AI-enhanced attacks have become more personal and realistic, allowing less skilled individuals to execute sophisticated phishing and social engineering schemes. However, on a positive note, AI has made viable what was once prohibitively expensive: personalized phishing training and behavioral anomaly detection, alongside automation of internal processes that enhance agility in organizations.
“The situation allows a broader range of criminals to engage in attacks,” Reiser pointed out. He noted that the increased volume and sophistication of these attacks present serious challenges, with methods evolving in ways that might have been unimaginable just a few years ago. As a result, businesses must remain vigilant against the growing complexity of cyber threats.
In a recent video interview with Information Security Media Group, Reiser elaborated on the implications of AI in modern cyberattacks. He identified the U.S. government as a particularly high-value target and discussed the importance of customizing security measures to match local attack methodologies. Furthermore, he remarked on how AI facilitates the development of in-house security capabilities, making it feasible for organizations to bolster their defenses more effectively.
Reiser’s background includes leading product management and machine learning teams at Twitter, as well as co-founding companies like Bloomspot and AdStack. His early career began with research and development in machine learning at Eastman Kodak, focusing on intelligence applications.
This discussion is particularly relevant in light of the evolving threat landscape, where tactics such as initial access via phishing, persistence through advanced malware, and privilege escalation are common. Organizations must leverage frameworks like the MITRE ATT&CK Matrix to understand potential adversary tactics and strategies, enabling them to strengthen their defenses against increasingly sophisticated cyber threats.