Abstract
Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security

Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1

Learn More
C2 Corner

C2 Corner: Climbing the Mountain Again and Again

Learn More
PR

Abstract Joins Torq AMP Alliance Program to Accelerate Agentic SecOps

Learn More
Product

90% of Your Splunk Data Is Helping Attackers, Not Analysts

Learn More
Security

Moving Laterally through Abuse of Managed Identities attached to VMs

Learn More
C2 Corner

C2 Corner: How I Mentor

Learn More
Security

Critical Ivanti EPMM Vulnerabilities: CVE-2026-1281 & CVE-2026-1340

Learn More
News

Abstract Security Partners with Netskope to turn Security Data into Real-Time Decisions

Learn More
C2 Corner

C2 Corner: Why I Mentor

Learn More
Security

Contagious Interview: Tracking the VS Code Tasks Infection Vector

Learn More
Security

Enabling the MongoDB Logging Firehose

Learn More
SIEM

Integrating Security Data Pipelines with Detection

Learn More
SIEM

What Is a Security Data Pipeline Platform (SDPP) and Why Do Security Teams Need One?

Learn More
Security

Critical MongoDB Vulnerability: CVE-2025-14847 (MongoBleed)

Learn More
News

Why Health-ISAC Selected Abstract Security to Support Its Internal SIEM Operations

Learn More
News

Dune Security and Abstract Security Partner to Deliver Real-Time Detection and Automated Risk Reduction

Learn More
C2 Corner

C2 Corner: Detection Doesn’t Fail First: Data Does

Learn More
Security

Critical Apache Tika Vulnerability: CVE-2025-66516 Enables XXE Injection

Learn More

Subscribe to our
newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.