• ®
  • About
    • About Us

      Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.

      Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

    • Leadership
    • Careers
  • Solutions

    Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services
    • Workshops
    • Microsoft Envisioning

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • Partners

    All Partners

    • Microsoft
  • News & Resources
    • All resources
    • Flash Notices
    • Blogs
    • Webinars

    Latest resource

    Securing the Future of Your Data Through Purview DSPM

    Learn how to govern AI securely with Microsoft Purview DSPM. Discover, classify, and protect sensitive data to enable AI without exposure.

    Learn more
  • Contact
    • About Us
    • Leadership
    • Careers
  • Governance, Risk & Compliance

    • Compliance Audit & Risk Assessment
    • Compliance Program Development
    • Continuous Compliance & Policy Management

    Attack Surface Management

    • Tool Consolidation & Optimization
    • Configuration & Deployment
    • Pen Testing & Exposure
    • Advisory Services

    Managed XDR & SecOps

    • Fusion MXDR
    • Configuration & Managed Services
    • Workshops
    • Microsoft Envisioning

    Microsoft Security Solutions

    • Threat Protection & Cloud Security
    • Data Security, Compliance & Privacy
    • Identity & Endpoint Management
    • AI Safety & Security
    • Microsoft Security Foundations
  • All Partners

    • Microsoft
    • All resources
    • Flash Notices
    • Blogs
    • Webinars

    Latest resource

    Securing the Future of Your Data Through Purview DSPM
  • Contact

Your header 1 goes here

 | Nov 19, 2025

Kraken Ransomware Group: Big-Game Hunting and Double Extortion Tactics

This report provides a detailed investigation into the Kraken ransomware group - their operations, methods, and the broader implications for cybersecurity.
 | Nov 12, 2025

Vulnerability in Simple User Capabilities Plugin Exposes WordPress Sites

CVE-2025-12158 is a critical privilege escalation vuln. affecting the Simple User Capabilities WordPress plugin (all versions up to + including 1.0).
 | Nov 5, 2025

Critical Vulnerability in Dataphone A920: CVE-2025-61235 Exposed

CVE-2025-61235 is a critical vulnerability affecting the Dataphone A920 firmware arising from improper validation of network packet input.
 | Oct 28, 2025

Critical Remote Code Execution in Oracle Marketing (E-Business Suite)

CVE-2025-53072 is a critical unauthenticated RCE vulnerability affecting the Marketing Admin module of Oracle Marketing, part of Oracle E-Business Suite.
 | Oct 14, 2025

Attackers Exploit Velociraptor in Sophisticated Ransomware Campaigns

Cisco Talos has confirmed that ransomware operators are weaponizing Velociraptor, an open-source DFIR tool, to aid in the deployment of ransomware attacks.
 | Oct 7, 2025

Google Salesforce Breach: UNC6040's Vishing and OAuth Attack Analysis

In June 2025, Google’s internal Salesforce instance, used for managing SMB data, was breached in a cyberattack orchestrated by the UNC6040 threat group.
 | Sep 30, 2025

AI vs. AI: Microsoft's Battle Against AI-Obfuscated Phishing Campaigns

Microsoft Threat Intelligence recently shut down a credential phishing campaign employing AI to obfuscate attack payloads and evade conventional defenses.
 | Sep 22, 2025

Google Urgently Patches Sixth Chrome Zero-Day Vulnerability of 2025

Google has urgently released a security update to address a critical zero-day vulnerability (CVE-2025-10585) in its Chrome web browser.
 | Sep 15, 2025

Hackers Hijack NPM Packages in Major Supply Chain Attack

A major software supply chain attack has shaken the open-source JavaScript ecosystem, as attackers hijacked several high-profile npm packages.
 | Sep 4, 2025

Critical Memory Overflow in Citrix NetScaler ADC & Gateway

CVE-2025-7775 is a critical memory overflow vulnerability in Citrix NetScaler ADC and NetScaler Gateway that enables unauthenticated RCE and/or DoS.
Prev 1 2 3 4 Next
Cybersecurity Solutions
  • Governance, Risk, + Compliance (GRC)
  • Attack Surface Management (ASM)
  • Managed XDR & SecOps
  • Microsoft Security Solutions
Company
  • Home
  • About Avertium
  • Partners
  • Leadership Team
  • Careers
  • Resources
  • Contact
  • Privacy and Legal

Sign up for weekly Flash Notices, tips and security news.

Have questions? Give us a call at 877-707-7997.

logo

Copyright © 2026 Avertium.
All Rights Reserved. Privacy Policy