• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Jan 24, 2021

Recent additions to TeamTNT Malware Campaign on Cloud Environments

This report is about the recent additions to the TeamTNT malware campaign to infect cloud environments and it is updated to capture AWS IAM user details more effectively.
 | Jan 6, 2021

New Golang Worm targets MySQL, Jenkins, Oracle WebLogic and other public services

Threat report on the new malware Golang Worm which is targeting services such as MySQL, Jenkins, and Oracle WebLogic.
 | Jan 6, 2021

Zyxel Firewall Backdoor Vulnerability CVE-2020-29583

This outlines the TTP for the Zyxel Firewall backdoor vulnerability CVE-2020-29583. It also provides mitigation recommendations.
 | Dec 28, 2020

What is Mobile App Testing?

Cybersecurity specialists utilize an assortment of tests and techniques to screen for vulnerabilities in order to evaluate the security of a mobile app.
 | Nov 16, 2020

PyXie distributing ransomware tools targeting Healthcare, Education, Government and Technology companies

This threat report is about bad actor PyXie Group's ransomware tools targeting various sectors including healthcare, education, government, and technology.
 | Nov 10, 2020

What you need to know about Telemedicine, HIPAA Compliance and the Pandemic

What you need to know about evolving telemedicine policies and HIPAA compliance during this pandemic.
 | Oct 30, 2020

3 Scary Stories of Data Breach Disasters

3 data breach stories that could happen to any company and that could've been preventable.
 | Oct 27, 2020

TeamTNT Attacks Cloud Environments

TeamTNT attacks cloud environments with Weave Scope. This report describes the tactics, techniques, and procedures used and how to defend against them.
 | Oct 22, 2020

We have an MDR...do we still need a SIEM?

Explains what MDR and SIEM are, and how they can work together to provide you with a superior cybersecurity solution.
 | Oct 20, 2020

Translating Paper into Trust

Edward Vasko explains how collaboration can lead to security controls tailored to minimize their impact on job performance.
Prev 7 8 9 10 11 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy