Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (0)
    • Homepage (0)
    • How-To (9)
    • Landing Page (0)
    • News (17)
    • Other Content (132)
    • Service (2)
    • Standard & Guideline (0)
    • Status (0)

    Service Category

    • Access & Identity (0)
    • Business Applications (0)
    • Desktop Support (0)
    • Education Applications (0)
    • Email & Collaboration (3)
    • Health Systems (0)
    • Hosting & Computing (0)
    • Network & Wireless (0)
    • Phones & Pager (0)
    • Research Services (0)
    • Security (6)
    • Web Services (0)

    160 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    Jul 2023: Phishing Attacks Use Fight-Themed Lure to Spread Malware

    Cybercriminals have launched a series of phishing attacks that claim to inform the recipient of physical altercations between employees and equipment damage at a worksite.  The lures include a malicious attachment allegedly containing a video of the altercation.

    Other Content

    Jun 2023: Phishing Attacks Use Compromised Microsoft Office 365 Accounts

    Cybercriminals have launched phishing attacks leveraging compromised Microsoft Office 365 accounts.  The lures include .rpsmg file attachments, as well as embedded URLs hidden behind a “Read the Message” button.    Clicking the malicious link leads to a credential phishing kit that redirects the user to a legitimate login page.

    Other Content

    May 2023: Phishing Attacks Impersonate Secure Share Providers

    Attackers have launched a series of phishing attacks impersonating reputable secure share providers, which are used for securely sharing files.  The lures contain links or attachments containing the supposed document.  Interacting with the link or attachment leads to the installation of credential harvesting malicious software (malwa

    Other Content

    May 2023: URL Shortening Service Widely Abused in Attacks

    Cybercriminals have started using the URL shortening service clck[.]ru in widespread phishing attacks in April.  The nature of these attacks and the lures used vary greatly.

    Other Content

    Jan 2023: Campaign Uses Paycheck Fax-Themed Lure

    Cybercriminals have launched a series of phishing attacks using an emailed fax of an alleged paycheck as a lure.

    Other Content

    Dec 2022: Phishing Campaign Distributing Christmas Bonus-Themed Lure

    Cybercriminals have launched a series of phishing attacks using the promise of a paid Christmas bonus as a lure.

    Other Content

    Nov 2022: Amazon-Themed Lures Distributed Via Zoom

    Cybercriminals have launched a series of malicious email attacks impersonating an Amazon package order confirmation. The attack uses Amazon-branded emails delivered from a Zoom sending address, as threat actors are abusing Zoom’s infrastructure. The emails prompt recipients to click a link to download an invoice for order details.

    Other Content

    Don't be the catch of the day

    The link to the quiz is at the end of the article. Everyone who passes during July is entered to win one of six grand prizes!

    How-To

    Avoid Spam

    Most of us have received unsolicited email at one time or another. Most of the time, we just delete the message and get on with our lives. However, there may be times when some of the content of this email is so offensive or so obviously an illegal scam that we ask ourselves, "How do these people get my address, and what can I do to stop this?" Good question. Let's first examine how spammers may get your address. How do spammers and marketers get my address?

    • Technical Partner
    • Security
    Other Content

    Jun 2023: Hijacked Email Threads Spread Malicious Software

    Cybercriminals have launched phishing attacks that hijack legitimate email threads to deliver malicious URLs. Attackers hijack email threads to further increase the believability of the attacks.

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 8
    • Page 9
    • Page 10
    • Page 11
    • Current page 12
    • Page 13
    • Page 14
    • Page 15
    • Page 16
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California