Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
585 Results
Dec 2022: Microsoft OneDrive and QR Codes Used in Phishing Campaign
Recent email-based attacks have used compromised Microsoft OneDrive accounts to send phishing emails. These emails encourage recipients to click a link to view a shared document. The OneDrive links lead targets to shared PDF documents containing quick response (QR) codes.
Nov 2022: Amazon-Themed Lures Distributed Via Zoom
Cybercriminals have launched a series of malicious email attacks impersonating an Amazon package order confirmation. The attack uses Amazon-branded emails delivered from a Zoom sending address, as threat actors are abusing Zoom’s infrastructure. The emails prompt recipients to click a link to download an invoice for order details.
May 2023: Phishing Attacks Deliver Remote Access Malware
Threat Alert: What to Watch For
Mar 2023: Malicious OneNote Attachment Lures
Dec 2022: Phishing Campaign Distributing Christmas Bonus-Themed Lure
Cybercriminals have launched a series of phishing attacks using the promise of a paid Christmas bonus as a lure.
May 2023: AI-Themed Phishing Lures Distribute Threats
Cybercriminals have launched a campaign distributing malware with an AI-themed lure. The lure purports to be from an “Information Technology Manager” regarding a mandatory system update for employees. The email body directs recipients as to how they can download the new AI-powered software.
Operational
Multi-Factor Authentication (Duo)
Phishing and brute force attacks are increasing exponentially, and so are the risks that your credentials may be stolen. Multi-factor authentication (also known as two factor authentication), or MFA, provides added security control to ensure that every login from every device is legitimate.
- Affiliate
- Faculty
- Staff
- Technical Partner
- Access & Identity
Nov 2022: Twitter-Themed Lures Used in Credential Phishing Attacks
Cybercriminals have launched phishing attacks impersonating Twitter Services. The emails include links to lookalike landing pages that are designed to steal Twitter credentials and phone numbers. While the email display names make it appear the messages come from “Twitter Services,” the actual sending address is a Gmail account. The emails use the proposed change at Twitter of charging verified users a monthly fee to maintain their verification status.
Get Global Access with eduroam
eduroam (education roaming) is the secure worldwide federated network access service developed for the international research and education community.For the traveler:
- Affiliate
- Faculty
- Non-UCSF
- Staff
- Student
- Network & Wireless
Operational
Zoom Web Conferencing
Zoom is a simple, all-in-one solution that lets you meet across desktops, mobile devices and conference rooms. Zoom is free to UCSF faculty, staff and learners, and the UCSF Zoom instance is HIPAA-compliant.
- Affiliate
- Faculty
- Staff
- Student
- Volunteer
- Email & Collaboration