Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
139 Results
Other Content
Oct 2023: Business Email Compromise Lures Spoof US Fire Administration
Threat Alert: BEC Lures Imitate US Fire Administration
Other Content
Oct 2023: Dual-Purpose Phishing Attacks Use Blocked Email Lure
Threat Alert: Dual-Purpose Phish Use Blocked Email Lure
Other Content
Aug 2023: USDA-Themed Lures Use Embedded URLs, QR Codes to Harvest Email Credentials
Threat Alert: USDA-Themed Lures Harvest Email Credentials
Other Content
Feb 2025: Travel-Themed Lures Lead to Remote Management Monitoring (RMM) Tool Installation
Other Content
March 2024: ClickFix Attacks Trick People Into Following Commands that Install Malware
Other Content
Feb 2025: Telephone-Oriented Attack Delivery (TOAD) Attacks Trick Users into Downloading Remote Access Software
Other Content
UCSF IT Security Policy/Standards Hierarchy
IT policies and standards that must be adhered to by all UCSF staff, faculty, affiliates, and students and the guidance and procedures created to facilitate adherence to the policies.