Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3164 Results
Nov 2022: Shopping and Shipping Themed Mobile Attacks Likely to Ramp in Coming Weeks
Holiday-Related Phishing Attacks: What You Need to Know Every year, as the holiday shopping season approaches, holiday-themed phishing attacks rise. Attackers know the season brings a high volume of ecommerce activity—and related notifications.
Vulnerabilities in the NVIDIA Display Driver
NVIDIA has released a security update to address vulnerabilities in the NVIDIA Display Driver. A malicious actor could exploit these vulnerabilities to perform code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
Vulnerabilities in Various Red Hat Products in November
Red Hat released multiple security updates in November for various Red Hat products.
Vulnerabilities in Various Ubuntu Products in November 2022
Ubuntu released multiple security updates in November for various Ubuntu products. For a complete description of the vulnerabilities and affected systems go to Ubuntu November 2022 Archives by date. IT Security Read more about IT Security service offerings.
Vulnerabilities in Various Suse Products in November
Suse released multiple security updates in November for various Suse products.
Nov 2022: Twitter-Themed Lures Used in Credential Phishing Attacks
Threat Alert: What to Watch For Cybercriminals have launched phishing attacks impersonating Twitter Services. The emails include links to lookalike landing pages that are designed to steal Twitter credentials and phone numbers. While the email display names make it appear the messages come from “Twitter Services,” the actual sending address is a Gmail account. The emails use the proposed change at Twitter of charging verified users a monthly fee to maintain their verification status.
Nov 2022: Amazon-Themed Lures Distributed Via Zoom
Threat Alert: What to Watch For Cybercriminals have launched a series of malicious email attacks impersonating an Amazon package order confirmation. The attack uses Amazon-branded emails delivered from a Zoom sending address, as threat actors are abusing Zoom’s infrastructure. The emails prompt recipients to click a link to download an invoice for order details.
Real Phishing Threats
Please note that this is not an all-inclusive list of all of the phishing threats but rather ones that are typical of current threats and/or ones that were actually received by UCSF staff, faculty, and/or learners (must be logged in to MyAccess to view). Be diligent with all communications, and please, even if you think an email might be a phish, report it via Phish Alarm and find out almost instantly in most cases. Overreporting is never an issue!
Vulnerability in Apache Batik Has Been Weaponized
H-ISAC reported that a vulnerability in Apache Batik has been Weaponized. The vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. For a complete description of the vulnerabilities and affected systems go to Apache Batik CVE-2022-40146. IT Security
Fortinet FortiTester Vulnerabilities
Fortinet has released security advisory to address vulnerabilities in Fortinet FortiTester. For a complete description of the vulnerabilities and affected systems go to: FortiTester - Unauthenticated command injection FortiTester - Missing account lockout on telnet port IT Security