Abstract
Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security

How Attackers Disable CloudTrail Without Calling StopLogging or DeleteTrail

Learn More
C2 Corner

When Every Agent Acts, Who Do You Chase? The Authority Problem Redefining Incident Response

Learn More
Reports

Priced to Move: The Underground Markets of Modern Cyberattacks

Learn More
Security

Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2

Learn More
Security

Critical Cisco Vulnerabilities: CVE-2026-20079 and CVE-2026-20131 Affecting Cisco Secure Firewall Management Center‍

Learn More
Security

Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1

Learn More
C2 Corner

C2 Corner: Climbing the Mountain Again and Again

Learn More
PR

Abstract Joins Torq AMP Alliance Program to Accelerate Agentic SecOps

Learn More
Product

90% of Your Splunk Data Is Helping Attackers, Not Analysts

Learn More
Security

Moving Laterally through Abuse of Managed Identities attached to VMs

Learn More
C2 Corner

C2 Corner: How I Mentor

Learn More
Security

Critical Ivanti EPMM Vulnerabilities: CVE-2026-1281 & CVE-2026-1340

Learn More
News

Abstract Security Partners with Netskope to turn Security Data into Real-Time Decisions

Learn More
C2 Corner

C2 Corner: Why I Mentor

Learn More
Security

Contagious Interview: Tracking the VS Code Tasks Infection Vector

Learn More
Security

Enabling the MongoDB Logging Firehose

Learn More
SIEM

Integrating Security Data Pipelines with Detection

Learn More
SIEM

What Is a Security Data Pipeline Platform (SDPP) and Why Do Security Teams Need One?

Learn More

get updates from abstract straight to your email

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.