Need to Report an Incident? Call +1 (877) 707-7997

Guidance on the SolarWinds Orion Compromise       

Cybersecurity at scale without complexity at scale


We are the human element delivering every facet of cybersecurity services – cloud, data, network, endpoints – with more rigor, more relevance and more responsiveness. Over 2,500 organizations rely on the Avertium team to simplify, scale and level-up their security posture.


Avertium. Show No Weakness™


Comprehensive portfolio of cybersecurity consulting services from actionable risk assessments to pen testing, cyber augmentation services to digital forensics and incident response.


XDR approach to managed security services with MDR, EDR, Managed Vulnerability Management and Managed Zero Trust Networking to address complex hybrid cloud environments, device proliferation and advanced threat landscape.


Deep bench of certified professionals to guide and help navigate the complex compliance and data privacy landscape including gap analysis and remediation services. [PCI DSS, HIPAA, HITRUST, SOC 1-3, NIST and more].

What people say.


New Phishing Campaign Uses Morse Code to Avoid Detection

Overview of TIR-20210221 This report is about a new phishing campaign that uses a unique method of obfuscation to avoid detection by traditional security appliances. The method of obfuscation is Morse code which is used to hide URLs. Given its ability to successfully bypass security tooling this campaign is quite dangerous

High Severity Windows Vulnerabilities Impact Windows Client & Windows Server OS Versions 7 and Above

Overview of CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086 This report is about three high severity Windows TCP/IP vulnerabilities tracked as CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086. All three are exploitable by a remote, unauthenticated attacker and impact Windows Client and Windows Server OS versions 7 and above. Successful exploitation could result in significant system downtime and

Vovalex Ransomware (TIR-20210207)

Overview of Vovalex This report is an overview of the new Vovalex ransomware. This malware was discovered by the MalwareHunterTeam and may be the first known ransomware to be written in the D language. As of now, this malware has been detected being distributed through pirated software that masquerades as legitimate

Heap-Based Buffer Overflow Vulnerability Discovered in Sudo (TIR-20210131)

Overview of TIR-20210131 This report is regarding a recently discovered vulnerability within the widely used Sudo utility that has existed for almost a decade. Sudo is used within Unix-based operating systems (Linux, MacOS, and others) to run commands either as another user, or most commonly as the superuser/root user. Qualys discovered