Threat Advisory

Threat Advisory: Fortinet Communication on “Backdoor Vulnerability”

On Tuesday a researcher posted a screenshot allegedly demonstrating someone using an exploit code to gain remote access to a server running Fortinet’s FortiOS software. Fortinet has communicated publicly that this issue was disclosed and resolved in July of 2014. They’ve stated, “This was not a “backdoor” vulnerability issue but rather a management authentication issue. The issue was identified by... Read More
January 13, 2016

Threat Advisory: Multiple Security Updates Released

Please ensure your organization is up to date on the latest Microsoft, Adobe and ISC releases. Users and administrators should review the bulletin links below and apply the necessary updates: Microsoft has released 9 updates to address vulnerabilities in their software. Review their latest bulletin here. Adobe has released multiple updates to address vulnerabilities in Acrobat and Reader. Review their... Read More

Threat Advisory: Juniper Unauthorized Code

Juniper has discovered unauthorized code in ScreenOS which could allow an attacker to take control of NetScreen devices and to decrypt VPN connections. Review the bulletin available here and update all affected ScreenOS versions. Herjavec Group circulates US – Cert advisories as this notification warrants attention and may have significance to your Enterprise network environment. If the following advisory is... Read More
December 18, 2015

Threat Update: Dorkbot and OpenSSL Update

Dorkbot Advisory The Dorkbot botnet is used to steal online payment information, support denial of service (DDos) attacks and deliver malware. Microsoft has confirmed that this family of malware has infected more than one million computers in over 190 countries this year. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and... Read More
December 4, 2015

Threat Update: eDellRoot

Dell consumer personal computers using the preinstalled certificate authority (CA) root certificate (eDellRoot) contain a critical vulnerability. This preinstalled root certificate resides on newer Dell laptops and desktops. Exploitation of the vulnerability could allow a remote attacker to read all encrypted web browser traffic (HTTPS), successfully impersonate (spoof) any website, or perform other attacks on the affected system. Review the... Read More
November 25, 2015

Threat Advisory | Caution Regarding Breaking News Update Phishing Campaigns

In light of the recent attacks in France and the media coverage surrounding this major incident, Herjavec Group would like to ensure our customers are aware of the heightened risk of potentially fake news campaigns via phishing emails. We often see innocent end users lured into opening “Breaking News” communications when a serious event like this occurs. These campaigns are... Read More
November 14, 2015

Threat Advisory | Oracle Critical Patch Update

Oracle has released its Critical Patch Update for October 2015 to address 154 vulnerabilities across multiple products. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system. Herjavec Group encourages users and administrators to review the Oracle October 2015 Critical Patch Update and apply the necessary updates. Herjavec Group circulates US –... Read More
October 21, 2015

Threat Advisory | VMware Security Updates

VMware has released security updates to address vulnerabilities in vCenter and ESXi. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.  Users and administrators are encouraged to review VMware Security Advisory VMSA-2015-0007 and apply the necessary updates.   Herjavec Group circulates US – Cert advisories as this notification warrants attention and may have... Read More
October 2, 2015

Threat Advisory | FireEye HX 2.1 Vulnerability Update

FireEye has confirmed a vulnerability affecting its HX product version 2.1 (a legacy version, but still in use by some customers). The current release of FireEye’s HX product offering is version 2.6. FireEye has acknowledged that this vulnerability cannot be executed remotely, nor can it be exploited by an unauthenticated user.It is recommended that customers utilizing the HX product version... Read More
September 8, 2015

Threat Advisory | UDP-Based Amplification Attacks

Original release date by US Cert: January 17, 2014 | Last revised: August 19, 2015 A Distributed Reflective Denial of Service (DRDoS) attack is a form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible UDP servers, as well as bandwidth amplification factors, to overwhelm a victim system with UDP traffic. UDP, by design, is... Read More
August 20, 2015