| Mar 9, 2021 Growing Cybersecurity Company announces Chief Revenue Officer to Support Expansion Today, Avertium announced the appointment of Ben Masino as the company’s Chief Revenue Officer (CRO).
| Mar 8, 2021 DarkSide Ransomware Overview DarkSide ransomware is a Ransomware-as-a-Service (RaaS), primarily targeting Windows systems with the ability to target Linux OS variants.
| Feb 22, 2021 New Phishing Campaign uses Morse Code to avoid detection This report is about a new phishing campaign that uses a unique method of obfuscation to avoid detection by traditional security appliances.
| Feb 15, 2021 Severe Windows Vulnerabilities impact Windows Client & Server OS Versions 7 and Above This report is about three high severity Windows TCP/IP vulnerabilities tracked as CVE-2021-24074, CVE-2021-24094, and CVE-2021-24086.
| Feb 9, 2021 Zero Trust SIEM Strategy (Role of SIEM in Zero Trust Environment) Learn how your Security information and event management (SIEM) aids in mitigating risk as part of your larger Zero Trust Strategy.
| Feb 3, 2021 Heap-Based Buffer Overflow Vulnerability Discovered in Sudo (TIR-20210131) This report is regarding a recently discovered heap-based buffer overflow vulnerability within the widely used Sudo utility.
| Jan 24, 2021 Recent additions to TeamTNT Malware Campaign on Cloud Environments This report is about the recent additions to the TeamTNT malware campaign to infect cloud environments and it is updated to capture AWS IAM user details more effectively.
| Jan 6, 2021 New Golang Worm targets MySQL, Jenkins, Oracle WebLogic and other public services Threat report on the new malware Golang Worm which is targeting services such as MySQL, Jenkins, and Oracle WebLogic.
| Jan 6, 2021 Zyxel Firewall Backdoor Vulnerability CVE-2020-29583 This outlines the TTP for the Zyxel Firewall backdoor vulnerability CVE-2020-29583. It also provides mitigation recommendations.
| Dec 28, 2020 What is Mobile App Testing? Cybersecurity specialists utilize an assortment of tests and techniques to screen for vulnerabilities in order to evaluate the security of a mobile app.