• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Jul 1, 2021

CobaltStrike Overview

This report is about the use of the well-known tool CobaltStrike in adversarial campaigns, CobaltStrike dates all the way back to 2016.
 | Jun 28, 2021

Attack Surface Management vs. Vulnerability Management

Today's attack surface management extends beyond your physical IT assets, now encompassing your entire digital footprint, and vulnerability management focus on software and code-based variabilities.
 | Jun 15, 2021

REvil Ransomware Overview

This is a Threat Actor Profile on REvil, a RaaS syndicate. Most recently, the REvil ransomware group was connected to the attack on the JBS Meat Company.
 | May 26, 2021

Examining the relationship between Vulnerability Announcements & the increase in attacks until mitigated

This report discusses the relationship between the time a new vulnerability is announced & the increase in attacks against it until patched.
 | May 18, 2021

Avertium Named Winner in the Coveted Global InfoSec Awards 2021

Avertium Wins “Next-Gen in Managed Security Service Provider (MSSP)” In 9th Annual Global InfoSec Awards at #RSAC 2021
 | May 14, 2021

FiveHands Ransomware Overview

This report is an overview of the FiveHands Ransomware variant that successfully attacked an organization (CISA release date May 6, 2021).
 | May 11, 2021

Avertium, Med Tech Solutions, and LIFARS announces Security Alliance delivering comprehensive, Always-On Cloud Security for Healthcare Organizations

Three-way partnership creates the first solution combining managed cloud services, managed SOC, & incident response for the healthcare industry.
 | May 6, 2021

Overview of the BadAlloc Vulnerabilities

This report is an overview of a series of vulnerabilities discovered by Microsoft’s Section 52 research team, labeled “BadAlloc”.
 | May 5, 2021

Dell BIOS Driver Privilege Escalation Flaws

Hundreds of millions of Dell Computers (desktops, laptops, notebooks, and tablets), could be vulnerable to a BIOS Driver Privilege Escalation Flaw.
 | Apr 27, 2021

Exploitation Campaign by two threat actor groups affects pulse secure

The Pulse Secure vulnerability CVE-2021-22893 affects the following software releases: PCS 9.0R3/9.1R1 and higher.
Prev 5 6 7 8 9 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy