• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
  • News & Resources
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars

    Latest resource

    Building Trust Over Time: SOC 2 and the Importance of Annual Audits

    Business relationships are founded on trust, and in today’s digital world, trust around data security is especially critical.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Testing & Exposure

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners
    • All resources
    • Flash-Notices
    • Blogs
    • Webinars
  • Contact

Your header 1 goes here

 | Jan 6, 2023

Flash Notice: High-Severity Fortinet Vulnerabilities Impact FortiTester and FortiADC

Two high-severity vulnerabilities (CVE-2022-35845 and CVE-2022-39947) were found in Fortinet’s FortiADC and FortiTester.
 | Jan 5, 2023

Flash Notice: Zoho Manage Engine Vulnerability - Patch Now

This week, Zoho disclosed a critical security vulnerability (CVE-2022-47523) impacting some of their ManageEngine products.
 | Dec 29, 2022

Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution

This week, VMware patched a critical vulnerability (CVE-2022-31705) impacting ESXi, Workstation, Cloud Foundation, and Fusion.
 | Dec 16, 2022

Flash Notice: Critical VMware Vulnerabilities

This week, VMware patched a critical vulnerability (CVE-2022-31705) impacting ESXi, Workstation, Cloud Foundation, and Fusion.
 | Dec 15, 2022

Flash Notice: Critical Remote Code Execution Vulnerability Found in SPNEGO

An RCE Vulnerability found in the common Windows Protocol SPNEGO NEGOEX has been upgraded from a 3.1 CVSS score to an 8.1.
 | Dec 14, 2022

Flash Notice: Critical Citrix Zero-Day Exploited by Attackers

A critical zero-day vulnerability (CVE-2022-27518) was found in Citrix ADC and Gateway. It is an unauthenticated remote code execution vulnerability.
 | Dec 13, 2022

Flash Notice: Critical Fortinet Zero-Day Vulnerability Exploited in the Wild

A critical zero-day vulnerability (CVE-2022-42475) was found in multiple versions of Fortinet’s FortiOS SSL-VPN.
 | Dec 7, 2022

Flash Notice: Google Patches Actively Exploited Zero-Day

A zero-day vulnerability impacting all browser versions of Google Chrome (including Opera & Microsoft Edge) is being actively exploited by threat actors.
 | Dec 1, 2022

Flash Notice: Oracle Vulnerability Actively Exploited

A patched vulnerability (CVE-2021-35587) found in Oracle’s Fusion Middleware Access Manager (OAM) is currently under active exploitation.
 | Nov 18, 2022

Flash Notice: Two High-Severity Vulnerabilities Found in F5 BIG-IP and BIG-IQ Products

This week, Rapid7 researchers discovered two high-severity vulnerabilities in F5 BIG-IP and BIG-IQ products running customized distribution of CentOS.
Prev 16 17 18 19 20 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo
Avertium Cyber Fusion Centers
Arizona • Tennessee

Copyright © 2025 Avertium.
All Rights Reserved. Privacy Policy