Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (0)
    • Homepage (0)
    • How-To (9)
    • Landing Page (0)
    • News (17)
    • Other Content (132)
    • Service (2)
    • Standard & Guideline (0)
    • Status (0)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (3)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (6)
    • Web Services (0)

    160 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    Aug 2023: Phishing Attacks Abuse Proofpoint Branding

    Threat Alert: Phishing Attacks Abuse Proofpoint Branding

    Other Content

    Feb 2024: 2024 Tax-Themed Lures

     

    Other Content

    Feb: 2024: Real Phish Received at UCSF - Payroll Lure Harvesting Credentials

    Picture of Actual Phish:

    HR Lure Phish Indicators

    Picture of Actual Landi

    Other Content

    Jan 2024: NHS-Themed Lures Steal Microsoft Credentials

    Cybercriminals have launched a series of phishing attacks using spoofed or compromised email accounts belonging to the National Health Service (NHS). These emails, which appear to come from a NHS[.]net email address, use the subject line “YOU NEED TO SETTLE THIS.” A fully capitalized subject line like this is unlikely to come from an official government institution.   The lures contain a prompt to review an alleged DocuSign document.

    Other Content

    Feb 2024: Job Offer Message Lures

    Threat Alert: Job Offer Message Lures 

    How-To

    Email Tagging

    • Affiliate
    • Faculty
    • Staff
    • Student
    • Technical Partner
    • Volunteer
    News

    Digital Armor: Essential Security Tools for Protecting Your Devices

    The link to the quiz is at the end of the art

    How-To

    Using Add-ins in Outlook Web App

    Add-ins in Outlook.com are programs or utilities that help you automate tasks when you view or create messages.NOTE: You will need to install add-ins within Outlook to be able to use them in your work at UCSF.The following steps will assist you with locating and installing add-ins within Microsoft Outlook.1. Select the Apps icon (Outlook Web App (OWA)

    • Affiliate
    • Faculty
    • Researcher
    • Staff
    • Student
    • Email & Collaboration
    Other Content

    Dec 2022: Microsoft OneDrive and QR Codes Used in Phishing Campaign

    Recent email-based attacks have used compromised Microsoft OneDrive accounts to send phishing emails. These emails encourage recipients to click a link to view a shared document. The OneDrive links lead targets to shared PDF documents containing quick response (QR) codes.

    Other Content

    Aug 2023: Geek Squad-Themed Lures Used in TOAD Attacks

    Recent phishing emails are masquerading as notifications alerting the recipient to an automatic renewal of Best Buy’s Geek Squad Total Protect & Webroot Advance Threat Protection. The emails, however, do not use Best Buy sending addresses.  Unlike many traditional phishing attacks, the emails do not include malicious links or attachments.

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 7
    • Page 8
    • Page 9
    • Page 10
    • Current page 11
    • Page 12
    • Page 13
    • Page 14
    • Page 15
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California