Threat Advisory: Critical glibc Flaw Puts Linux Machines at Risk

GNU C Library (glibc) is a collection of open source code that powers thousands of applications and most Linux distributions. A highly critical vulnerability has been uncovered in the GNU C Library (glibc), a key component of most Linux distributions.  The vulnerability, which is indexed as CVE-2015-7547, is a stack-based buffer overflow vulnerability in glibc's DNS client-side resolver that is used... Read More
February 17, 2016

Threat Advisory: Cisco Security Update

Cisco has released a security update to address a vulnerability in its ASA software. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system.  Systems Affected: Cisco ASA 5500 Series Adaptive Security Appliances Cisco ASA 5500-X Series Next-Generation Firewalls Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers... Read More
February 11, 2016

Threat Advisory: Ransomware Impacting WordPress sites

A large number of WordPress websites have been compromised and are delivering TeslaCrypt ransomware. While it is not yet clear how these sites are being infected, it is suspected that there is a new vulnerability in WordPress or within a popular plug in. The compromised sites were hacked and had an encrypted code added to the end of their legitimate... Read More
February 8, 2016

Robert Herjavec on CNBC: The Biggest Cyber Threats of 2016

Robert Herjavec, Founder & CEO of Herjavec Group, speaks with CNBC about the cyber threats every organization should be aware of. In 2016 businesses of all sizes are moving to the cloud in large numbers and security should continue to be your number one priority. With cyber terrorism, social engineering, ransomware and threats from the inside, employee awareness and security education... Read More
February 3, 2016

Inside the Tank at RSA Conference 2016

Join us for a Fireside Security Chat with Robert Herjavec and George Gerchow Kick-off RSA Conference 2016 with a fireside chat and networking reception featuring Robert Herjavec, Founder and CEO of Herjavec Group, and George Gerchow, Director of Product Management (Security & Compliance) at Sumo Logic. Robert and George will share their perspectives on today’s biggest challenges and opportunities for the security... Read More
February 1, 2016

Robert Herjavec Keynote at the RSA Conference Cloud Security Alliance Summit – February 29th, 2016

The information security industry is rapidly being transformed into solutions delivered by and for cloud computing.  Join Herjavec Group at the RSA Conference’s Cloud Security Alliance (CSA) Summit  to learn about enterprise progress in shifting to cloud computing and key emerging trends in information security.  World leading security experts and cloud providers will discuss global governance, the latest threats, best... Read More

Herjavec Group Managed Services Practice Achieves SOC 2 Type 2 Certification

Herjavec Group is thrilled to announce that our Managed Services Practice has achieved SOC 2 Type 2 certification from the American Institute of Certified Public Accountants (AICPA). The SOC 2 Type 2 certification is only awarded to technology and cloud computing organizations who demonstrate best practices in terms of their system, suitability of design and operating effectiveness. Within these realms,... Read More

Oracle Releases Security Bulletin

Oracle recently released its Critical Patch Update to address 248 vulnerabilities across multiple products for January 2016. Some of these vulnerabilities may allow an attacker to remotely take full control of an affected system.  Herjavec Group strongly advises users and administrators to apply all of the necessary patches and review Oracle's original update here. Herjavec Group circulates US – Cert advisories... Read More
January 20, 2016

Threat Advisory: Linux Kernel Vulnerability (CVE-2016-0728)

According to the Perception Point research team, a zero-day vulnerability, which has existed since 2012, has been discovered today allowing Android or Linux applications to escalate privileges and gain root access. Any Linux machine with Kernel 3.8 or higher is vulnerable, which includes tens of millions of Linux PCs and servers, as well as 66% of all Android devices. By... Read More
January 19, 2016