Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (21)
    • Homepage (1)
    • How-To (656)
    • Landing Page (54)
    • News (142)
    • (-) Other Content (658)
    • Service (169)
    • Standard & Guideline (42)
    • Status (851)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (0)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (0)
    • Web Services (0)

    658 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    High Vulnerability in ServiceNow Now Platform

    ServiceNow released a security update to address a High vulnerability in the ServiceNow Now Platform. If exploited, the vulnerability could allow an attackers to execute arbitrary code.

    Other Content

    Critical and Other Vulnerabilities in Hewlett Packard Enterprise (HPE) Instant AOS-8 and AOS-10 Software

    HPE released security updates to address Critical and other vulnerabilities in HPE Instant AOS-8 and AOS-10 software. A remote attacker could exploit these vulnerabilities to perform unauthenticated command injection.

    Other Content

    Nov 2024: IRS-THEMED LURES Distribute Remote Management Tool

    Other Content

    Important Vulnerability in Microsoft Windows Update

    Microsoft released security updates and guidance to address an Important vulnerability in Microsoft Windows Update. Attackers with administrative privileges could exploit them to perform downgrade attacks, reverting fully up-to-date systems to older versions containing exploitable vulnerabilities. 

    Other Content

    Critical 0-day Vulnerability in QNAP HBS 3 Hybrid Backup Sync

    QNAP released a security update to address a Critical 0-day vulnerability  in QNAP QNAP HBS 3 Hybrid Backup Sync. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands. 

    Other Content

    Vulnerabilities in Google Chrome

    Google has released new versions of Chrome to address vulnerabilities in Google Chrome. For a complete description of the vulnerabilities and affected systems go to Chrome Releases. IT Security Read more about IT Security service offerings.

    Other Content

    Oct 2014: NDA-THEMED LURES ABUSE DocuSign Brand to Steal Credentials

    Other Content

    Important Vulnerability in Microsoft Windows Update

    Microsoft released security updates and guidance to address an Important vulnerability in Microsoft Windows Update. Attackers with administrative privileges could exploit them to perform downgrade attacks, reverting fully up-to-date systems to older versions containing exploitable vulnerabilities. 

    Other Content

    Vulnerabilities in Multiple Apple Products

    Apple has released security updates to address vulnerabilities in multiple Apple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. 

    Other Content

    0-day and Other Vulnerabilities in Multiple Cisco Products

    Cisco has released security updates to address a 0-day and other vulnerabilities in multiple Cisco Products.  A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. 

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 26
    • Page 27
    • Page 28
    • Page 29
    • Current page 30
    • Page 31
    • Page 32
    • Page 33
    • Page 34
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California