Abstract
Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security

Critical MongoDB Vulnerability: CVE-2025-14847 (MongoBleed)

Learn More
News

Why Health-ISAC Selected Abstract Security to Support Its Internal SIEM Operations

Learn More
News

Dune Security and Abstract Security Partner to Deliver Real-Time Detection and Automated Risk Reduction

Learn More
C2 Corner

C2 Corner: Detection Doesn’t Fail First: Data Does

Learn More
Security

Critical Apache Tika Vulnerability: CVE-2025-66516 Enables XXE Injection

Learn More
Security

Critical React Server Components RCE (CVE-2025-55182): What You Need to Patch Now

Learn More
C2 Corner

AI Agents and Automated SOCs: Centering End-to-End Workflows for Real Impact

Learn More
Security

Shrinking the Stack of Needles

Learn More
Security

How to Triage npm Malware Incidents | Free npm SBOM Tool for Fast Response

Learn More
Security

Security Data Pipelines Have Become the Center of the SOC. The Market Knows It, and So Do We.

Learn More
Security

Gainsight Breach: SaaS Supply Chain Attack Exposes Salesforce Integrations

Learn More
C2 Corner

C2 Corner: Rebooting Security Operations: Mission First, People Always

Learn More
C2 Corner

C2 Corner: State of Enterprise Detection Engineering for a Modern SOC

Learn More
Product

Reclaiming the Pipeline: Real-Time Detection Without Blowing the Budget

Learn More
C2 Corner

C2 Corner: From Frameworks to Flywheels - How Dropbox’s Jess Jimenez Measures Security Momentum

Learn More
Security

Salesforce Forensics: Telemetry for Detection & Response

Learn More

Shifting Detection Left: How to Decouple SIEM Detection Criteria for Modern Security Operations

Learn More
C2 Corner

C2 Corner: Stop Automating the SOC. Start Automating Remediation.

Learn More

get updates from abstract straight to your email

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.