• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Avertium Blog

 | Feb 9, 2021

Zero Trust SIEM Strategy (Role of SIEM in Zero Trust Environment)

Learn how your Security information and event management (SIEM) aids in mitigating risk as part of your larger Zero Trust Strategy.
 | Feb 3, 2021

Heap-Based Buffer Overflow Vulnerability Discovered in Sudo (TIR-20210131)

This report is regarding a recently discovered heap-based buffer overflow vulnerability within the widely used Sudo utility.
 | Jan 24, 2021

Recent additions to TeamTNT Malware Campaign on Cloud Environments

This report is about the recent additions to the TeamTNT malware campaign to infect cloud environments and it is updated to capture AWS IAM user details more effectively.
 | Jan 6, 2021

New Golang Worm targets MySQL, Jenkins, Oracle WebLogic and other public services

Threat report on the new malware Golang Worm which is targeting services such as MySQL, Jenkins, and Oracle WebLogic.
 | Jan 6, 2021

Zyxel Firewall Backdoor Vulnerability CVE-2020-29583

This outlines the TTP for the Zyxel Firewall backdoor vulnerability CVE-2020-29583. It also provides mitigation recommendations.
 | Dec 28, 2020

What is Mobile App Testing?

Cybersecurity specialists utilize an assortment of tests and techniques to screen for vulnerabilities in order to evaluate the security of a mobile app.
 | Nov 16, 2020

PyXie distributing ransomware tools targeting Healthcare, Education, Government and Technology companies

This threat report is about bad actor PyXie Group's ransomware tools targeting various sectors including healthcare, education, government, and technology.
 | Nov 10, 2020

What you need to know about Telemedicine, HIPAA Compliance and the Pandemic

What you need to know about evolving telemedicine policies and HIPAA compliance during this pandemic.
 | Oct 30, 2020

3 Scary Stories of Data Breach Disasters

3 data breach stories that could happen to any company and that could've been preventable.
 | Oct 27, 2020

TeamTNT Attacks Cloud Environments

TeamTNT attacks cloud environments with Weave Scope. This report describes the tactics, techniques, and procedures used and how to defend against them.
Prev 7 8 9 10 11 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy