Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
342 Results
Mar 2023: Global Phishing Campaigns Using Tax Season Lures
Threat Alert: What to Watch For Cybercriminals have launched numerous, different phishing attacks using timely tax-themed lures. As multiple attacks are leveraging this topic, the lures will appear different.
Apr 2023: Okta-Themed Lures Harvest Microsoft Credentials
Threat Alert: What to Watch For Cybercriminals have launched Okta-branded phishing attacks encouraging recipients to follow a link to resynchronize their Okta and Microsoft accounts. Clicking on the link leads to a credential phishing kit that redirects the user to a lookalike Microsoft login page.
ProofPoint Quarantine FAQs
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
Avoiding Spam
- Affiliate
- Faculty
- Staff
- Student
- Technical Partner
- Volunteer
Sep 2023: Phishing Lure Uses Potential Employment Status Theme
Threat Alert: Employment Status-Themed Phishing Lures Cybercriminals have launched a series of phishing attacks using concerns over the recipient’s employment status legality as a lure. The lures contain a link purportedly related to employment status documentation. Key Actions (at Work and at Home)
RAE - Drive Mapping Instructions
Drive Mapping - Windows and Mac InstructionsWindows InstructionsMac InstructionsIt can sometimes be more convenient to map your RAE drive directly to your Windows or Mac device. These instructions will teach you how to do so on both types of devices. A VPN or UCSF network connection is required.Specific share names and paths are supplied in the RAE Welcome letter when signed up.
- Staff
Dec 2022: HIPAA-Related Lures
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks impersonating the legitimate law firm, including Latham & Watkins.
Jan 2024: Phishing Attacks Use CAPTCHA to Increase Trust
Threat Alert: Phishing Attacks Use CAPTCHA to Increase Trust Cybercriminals have launched a series of phishing attacks imitating a legitimate company.
Subscribe to a Listserv
- Faculty
- Staff
- Student
Avoid Spam
Overview Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?
- Technical Partner
- Security