FLASH NOTICE: Flash Notice: SonicWall Warns of Imminent Ransomware Attack Against EOL Products

Need to Report an Incident? Call +1 (877) 707-7997

Cybersecurity at scale without complexity at scale

CYBERSECURITY AT SCALE, WITHOUT COMPLEXITY AT SCALE.

We are the human element delivering every facet of cybersecurity services – cloud, data, network, endpoints – with more rigor, more relevance and more responsiveness. Over 2,500 organizations rely on the Avertium team to simplify, scale and level-up their security posture.

 

Avertium. Show No Weakness™

STRATEGIC ASSESSMENT & ADVISORY SERVICES

Comprehensive portfolio of cybersecurity consulting services from actionable risk assessments to pen testing, cyber augmentation services to digital forensics and incident response.

MANAGED SECURITY SERVICES

XDR approach to managed security services with MDR, EDR, Managed Vulnerability Management and Managed Zero Trust Networking to address complex hybrid cloud environments, device proliferation and advanced threat landscape.

GOVERNANCE & COMPLIANCE

Deep bench of certified professionals to guide and help navigate the complex compliance and data privacy landscape including gap analysis and remediation services. [PCI DSS, HIPAA, HITRUST, SOC 1-3, NIST and more].

What people say.

LATEST THREAT REPORTS

Flash Notice: SonicWall Warns of Imminent Ransomware Attack Against EOL Products

Overview Details SonicWall has released an urgent security bulletin to their customers using unpatched, end-of-life Secure Mobile Access 100 series and Secure Remote Access products. The company indicates that there is an imminent ransomware campaign using stolen credentials targeting these devices running 8.x firmware. Since these firmware versions are considered end-of-life

Summary of the International Institute for Strategic Studies’ Nation-State Cyber Power Assessment

Executive Summary This report is a summary of a recent study, conducted by the International Institute for Strategic Studies, assessing the cyber power of 15 different nation-states. Each state was assessed in seven categories: Strategy and doctrine; Governance, command and control; Core cyber-intelligence capability; Cyber empowerment and dependence; Cyber security and

CobaltStrike Overview

Executive Summary This report is about the use of the well-known tool CobaltStrike in adversarial campaigns. The tool’s framework is designed for command & control operations with an established capacity and extreme ease of use. The tool can be integrated into the attacker lifecycle easily with minimal development time. CobaltStrike Tactics,

UPDATE: PrintNightmare – Unpatched Remote Code Execution Vulnerability in Default Windows Print Spooler Service

Overview Details: The PrintNightmare scenario continues to unfold as security researchers around the globe work to better understand how to detect and mitigate this critical vulnerability. The current best course of action is still to disable the Print Spooler service on all systems, however, there are business cases where printing is