A security product vendor has suffered a breach that exposed details about where the vendor's security controls are located and how its detection systems are designed, potentially giving threat actors an advantage in evading future defenses.