Abnormal Security Corporation
6 Marks
Corp.
First Filed:Oct 16, 2019Latest Filed:Mar 12, 2025Address:185 Clara Street, Suite 100, San Francisco, CA 94107, US
Portfolio Overview
Registered
1(17%)Pending
1(17%)Dead
4(67%)Previous
10Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 38
TelecommunicationsTTAB Proceedings
Total Proceedings
5As Plaintiff
1(20%)As Defendant
4(80%)Top Firms
PERKINS COIE LLP(Sep 2025)
14
Davis Wright Tremaine LLP(Apr 2024)
1
IPLA, LLP(Mar 2025)
1
Trademark Portfolio
16 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
6
10
Status
6
6
0
4
0
Mark Type
12
2
1
1
0
1
15
Goods & Services
Class 042: Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications
Goods & Services
Computer services for evaluating communications, including email and messages, and relational items to identify security threats and then monitor those security threats on an ongoing basis, namely, computer security threat analysis for protecting data; Computer services for recording behaviors of Software-as-a-Service (SaaS) accounts for security purposes, namely, identifying and examining digital activities performed with SaaS accounts to identify security threats; Computer services being online non-downloadable software for generating a federated collection of security threats posed to a company; Computer services for identifying and cataloging behaviors of SaaS accounts to discover patterns of unusual behavior, namely, monitoring of computer systems for detecting unauthorized access; Computer services in the nature of online non-downloadable software for generating a federated list of digital accounts for which behavior is unusual to prevent fraud; Computer services in the nature of online non-downloadable software for creating, populating, and managing lists of SaaS accounts determined to be security threats due to involvement in past digital activities; Computer services for analyzing digital activities performed with SaaS accounts to discover security threats, namely, examining the content and context of digital activities to identify cybersecurity security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify cybersecurity security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and eliminating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy
Goods & Services
SOC
Goods & Services
Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications
Goods & Services
Class 042: Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications
Goods & Services
Providing online non-downloadable software using artificial intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications
Goods & Services
"HUMAN BEHAVIOR AI PLATFORM"; Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity for restricting unauthorized access to computer systems and computer programs; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring the computer systems of those fraudulent individuals and entities on an ongoing basis to detect fraud; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, online monitoring of digital communications in computer systems for threat prevention and for identifying and cataloging individuals' and entities' behaviors to prevent fraud
Goods & Services
Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity for restricting unauthorized access to computer systems and computer programs; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring the computer systems of those fraudulent individuals and entities on an ongoing basis to detect fraud; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, online of digital communications in computer systems for threat prevention and for identifying and cataloging individuals' and entities' behaviors to prevent fraud
Goods & Services
Providing online non-downloadable software that utilizes machine learning in the field of cybersecurity for restricting unauthorized access to computer systems and computer programs; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring the computer systems of those fraudulent individuals and entities on an ongoing basis to detect fraud; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, online monitoring of digital communications in computer systems for threat prevention and for identifying and cataloging individuals' and entities' behaviors to prevent fraud
Goods & Services
Providing online non-downloadable software using artifical intelligence for machine learning in the field of cybersecurity; Providing online non-downloadable software that utilizes machine learning to determine the normal communication behavior of individuals to identify unusual communication behavior; Computer services for analyzing digital activities to discover security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, remediating instances of account takeover by restricting unauthorized access to accounts for email and messaging management services; Computer security services, namely, monitoring of computer systems to detect instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; Computer security consultancy; Computer security services for evaluating emails to identify fraudulent individuals and entities, such as vendors, and then monitoring via computer conduct of those fraudulent individuals and entities on an ongoing basis; Computer services for recording behaviors of individuals and entities deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving individuals and entities to identify security threats; Computer services for tracking digital activities of individuals and entities determined to be fraudulent based on an analysis of emails sent by those individuals and entities, namely, monitoring digital communications involving individuals and entities determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individuals and entities to prevent security threats, namely, identifying and cataloging individuals' and entities' behaviors through analysis of digital communications
Goods & Services
Computer services for evaluating email and relational items to identify fraudulent individuals and then monitoring conduct of those fraudulent individuals on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of individuals deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications to identify security threats; Computer services for tracking digital activities of individuals determined to be fraudulent based on an analysis of emails sent by those individuals, namely, monitoring digital communications involving individuals determined to be fraudulent to identify security threats; Computer services for generating a federated collection of individual behaviors to prevent security threats, namely, identifying and cataloging individual behaviors through analysis of digital communications; Computer services for generating a federated blacklist of individuals and associated behaviors to prevent fraud, namely, establishing a federated blocklist by analyzing digital communications; Computer services for creating, populating, and managing blacklists of individuals determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of individuals for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy
Goods & Services
Computer services for evaluating email and relational items to identify fraudulent vendors and then monitoring conduct of those fraudulent vendors on an ongoing basis, namely, providing a computer program featuring technology for evaluating email and relational items to identify security threats; Computer services for recording behaviors of vendors deemed to be fraudulent in a blacklist for security purposes, namely, identifying and examining digital communications involving vendors to identify security threats; Computer services for tracking digital activities of vendors determined to be fraudulent based on an analysis of emails sent by those vendors, namely, monitoring digital communications involving vendors determined to be fraudulent to identify security threats; Computer services for generating a federated collection of vendor behaviors to prevent security threats, namely, identifying and cataloging vendor behaviors through analysis of digital communications; Computer services for generating a federated blacklist of vendors and associated behaviors to prevent fraud, namely, establishing a federated blacklist by analyzing digital communications involving vendors; Computer services for creating, populating, and managing blacklists of vendors determined to be security threats due to involvement in past digital activities, namely, maintaining blacklists of vendors for the purpose of identifying security threats; Computer services for analyzing digital activities to discover security threats, namely, examining the content and context of digital activities to identify security threats; Computer services for analyzing digital communications occurring across email and messaging platforms to discover security threats, namely, examining the content and context of digital communications to identify security threats; Computer security services, namely, online scanning, detecting, quarantining, and eliminating of viruses, worms, trojans, spyware, adware, malware, social engineering based instructions and exploits, and unauthorized data and programs from digital communications including emails and messages; Computer security services, namely, monitoring, detecting, and remediating instances of account takeover; Software as a service (SaaS) featuring software for the analysis and protection of digital activities, communications, and accounts; Platform as a service (PaaS) featuring software-implemented platforms for the analysis and protection of digital activities, communications, and accounts; Email and messaging management services for others, namely, threat protection in the nature of monitoring computing systems to detect unauthorized access, data breach, and data exfiltration and storing digital communications recorded in electronic media; Software as a service (SaaS) featuring software for the analysis and protection of the security of network communications, cybersecurity, email management virus protection, email archiving, email continuity, and email security; computer security consultancy
Goods & Services
Class 042: Electronic mail (email) protection and security services, namely, on-line scanning, detecting, quarantining and elimination of viruses, worms, trojans, spyware, adware, malware, social engineering based intrusions and exploits, and unauthorized data and programs from user electronic mails; Software as a service (SaaS) featuring software for the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) featuring computer software platforms for the analysis and protection of the security of email and network communications and data; Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of emails recorded in electronic media; Software as a service (SAAS) featuring software for the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity and email security; computer security consultancy; none of the aforementioned related to data encryption services, design and development of downloadable mobile computer applications for computer devices or electronic data storage
Goods & Services
Class 042: Electronic mail (email) protection and security services, namely, on-line scanning, detecting, quarantining and elimination of viruses, worms, trojans, spyware, adware, malware, social engineering based intrusions and exploits, and unauthorized data and programs from user electronic mails; Software as a service (SaaS) featuring software for the analysis and protection of the security of email and network communications and data; Platform as a service (PAAS) featuring computer software platforms for the analysis and protection of the security of email and network communications and data; Email and messaging management services for others, namely, threat protection in the nature of computer virus protection services, monitoring of computer systems for detecting unauthorized access or data breach, and electronic storage of emails recorded in electronic media; Software as a service (SAAS) featuring software for the analysis and protection of the security of email and network communications and data, cybersecurity, email management virus protection, email archiving, email continuity and email security; computer security consultancy; none of the aforementioned related to data encryption services, design and development of downloadable mobile computer applications for computer devices or electronic data storage