Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2357 Results
Microsoft Co-Pilot
Microsoft has implemented changes to Copilot Chat (login version), which has resulted in existing users losing access to the service. We are currently investigating the issue in collaboration with Microsoft and IT Security. Please note that Copilot Chat (non-login version) is only compatible with P1 data.
Microsoft Copilot is currently under evaluation and has not yet been made available as a service to the UCSF community.Microsoft has implemented changes to Copilot Chat (login version), which has resulted in existing users losing access to the service. We are currently investigating the issue in collaboration with Microsoft and IT Security. Please note that Copilot Chat (non-login version) is only compatible with P1 data.
- Affiliate
- Researcher
- Staff
- Student
- Email & Collaboration
05/16/25: Vulnerabilities in Intel CPU
Intel released security updates to address vulnerabilities in Intel CPUs. Potential security vulnerabilities in some Intel® Processor indirect branch predictors may allow information disclosure.For a complete description of the vulnerabilities and affected systems, go to 2025.2 IPU - Intel® Processor Indirect Branch Predictor Advisory.IT Security
05/16/25: Critical, 0-Day, Exploited and Other Vulnerabilities In Microsoft Products
Microsoft released security updates to address Critical, 0-Day, Exploited and other vulnerabilities in Microsoft products.For a complete description of the vulnerabilities and affected systems, go to Microsoft Security Update Guide for May.IT SecurityRead more about IT Security service offerings.
05/16/25: Vulnerabilities in ASUS DriverHub
Asus released security updates to address vulnerabilities in Asus DriverHub. These vulnerabilities can be exploited to remotely perform arbitrary code execution.For a complete description of the vulnerabilities and affected systems, go to Asus Product Security Advisory.IT Security
05/16/25: Vulnerabilities in Cisco Products
Cisco released security updates to address vulnerabilities in Cisco products.For a complete description of the vulnerabilities and affected systems, go to Cisco Security Advisories.IT SecurityRead more about IT Security service offerings.
05/16/25: 0-day Exploited Vulnerability in SAP NetWeaver
SAP security updated its April 2025 Security Patch Day bulletin to address a Critical, 0-day, exploited vulnerability in SAP NetWeaver. SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system.
05/16/25: Vulnerabilities in Pixel Devices
Google released security updates to address vulnerabilities in Pixel Devices.For a complete description of the vulnerabilities and affected systems, go to Pixel Security Bulletin—May 2025.IT SecurityRead more about IT Security service offerings.
05/16/25: Vulnerabilities in Android Devices
Google released security updates to address vulnerabilities in Android Devices.For a complete description of the vulnerabilities and affected systems, go to Android Security Bulletin—May 2025.IT SecurityRead more about IT Security service offerings.
DataDog
Datadog is a cloud-based monitoring and security platform designed to provide real-time insights into the performance, health, and security of IT environments. It offers comprehensive observability by aggregating data across servers, databases, applications, containers, and cloud services into a unified platform.
Datadog is a cloud-based monitoring and security platform designed to provide real-time insights into the performance, health, and security of IT environments. It offers comprehensive observability by aggregating data across servers, databases, applications, containers, and cloud services into a unified platform. By integrating logs, metrics, traces, and user experience data, Datadog enables teams to detect and resolve issues faster, understand system behavior, and optimize performance.Value in Monitoring and Observability:
- Technical Partner
- Business Applications
Which GitHub do I use?
When people say “GitHub,” they often mean the public, open-source website www.github.com — where anyone can browse and contribute to millions of public code repositories.But that’s not what we’re talking about here.At UCSF, we offer two secure, enterprise-grade GitHub environments through our UCSF GitHub Enterprise Program — both designed to support your development work safely and effectively:
Choose the right GitHub at UCSF: Use On-Prem for P3/P4 data, Cloud for general dev—both are secure, UCSF-licensed, and free to use.