Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
148 Results
Aug 2023: USDA-Themed Lures Use Embedded URLs, QR Codes to Harvest Email Credentials
Threat Alert: USDA-Themed Lures Harvest Email Credentials
May 2024: Phishing Attacks Abuse Carrier411 Brand
Threat Alert:
Standard
Intune Mobile Device Management (MDM) Privacy
Impacted Services: Email, Microsoft 365, Microsoft 365: Teams
May 2024: Adobe URLs Lead to Credential Phishing Sites
Example
May 2024: NDA Lures Lead to Installation of Malicious Software
Example of an NDA lure used in
Steppingblocks
Description
Steppingblocks uses advanced data aggregation and processing techniques to gather career, academic, and demographic information from a vast array of publicly accessible sources.
May 2024: Phishing Lure Impersonating GSD Technologies Spreads Ransomware
Threat Alert:
Standard
UCSF 650-16 Addendum B - UCSF Minimum Security Standards for Electronic Information Resources
Effective Date: December 2007, Updated December 2021 Contents Purpose Overview and Scope Exception from Minimum Security Standards Exception Requests Covering Legacy Systems Compatibility Exemptions Enforcement Minimum Security Standards System Inventory and Protection Level Classification (PLC) Transmission of Restricted Information
Impacted Services: IT Security Outreach and Training
Apr 2024: Meta/Facebook Impersonation
Threat Alert: Meta/Facebook Im
UCSF IT Security Policy/Standards Hierarchy
IT policies and standards that must be adhered to by all UCSF staff, faculty, affiliates, and students and the guidance and procedures created to facilitate adherence to the policies.