Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (17)
    • Homepage (0)
    • How-To (283)
    • Landing Page (0)
    • News (71)
    • Other Content (160)
    • Service (64)
    • Standard & Guideline (20)
    • Status (37)

    Service Category

    • Access & Identity (18)
    • Business Applications (49)
    • Desktop Support (27)
    • Education Applications (7)
    • Email & Collaboration (115)
    • Health Systems (1)
    • Hosting & Computing (13)
    • Network & Wireless (15)
    • Phones & Pager (8)
    • Research Services (18)
    • Security (24)
    • Web Services (24)

    652 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    Nov 2022: Twitter-Themed Lures Used in Credential Phishing Attacks

    Cybercriminals have launched phishing attacks impersonating Twitter Services. The emails include links to lookalike landing pages that are designed to steal Twitter credentials and phone numbers. While the email display names make it appear the messages come from “Twitter Services,” the actual sending address is a Gmail account. The emails use the proposed change at Twitter of charging verified users a monthly fee to maintain their verification status.

    Other Content

    Oct 2023: TOAD Attack Spoofs Best Buy’s Geek Squad Branding

    Threat Alert: TOAD Attack Spoofs Geek Squad Branding

    Other Content

    Dec 2023: Eventbrite-Themed Lures Distribute Malware

    Threat Alert: Eventbrite-Themed Lures Distribute Malware 

    Other Content

    May 2023: AI-Themed Phishing Lures Distribute Threats

    Cybercriminals have launched a campaign distributing malware with an AI-themed lure.   The lure purports to be from an “Information Technology Manager” regarding a mandatory system update for employees.  The email body directs recipients as to how they can download the new AI-powered software.

    How-To

    Research Electronic Data Capture (REDCap) Programming

    REDCap software enables investigators to develop online survey instruments and databases. Our team runs an instance of REDCap in our data center that is distinct from the REDCap environment offered by Academic Research Systems (ARS).  

    • Affiliate
    • Research Staff
    • Researcher
    • Staff
    • Student
    • Research Services
    Other Content

    Feb: 2024: Real Phish Received at UCSF - Payroll Lure Harvesting Credentials

    Picture of Actual Phish:

    HR Lure Phish Indicators

    Picture of Actual Landi

    Other Content

    Mar 2023: Attacks Spread Microsoft Teams-Themed Lures

    Cybercriminals have launched phishing attacks using lures that impersonate Microsoft Teams meeting invites. The lures include a malicious link.  Clicking the malicious link leads to a credential phishing kit that redirects the user to a legitimate login page.

    Other Content

    Oct 2014: PHISHING LURES SPREAD Remote Management Software Through Malicious PDFs

    Other Content

    May 2023: Phishing Attacks Impersonate Secure Share Providers

    Attackers have launched a series of phishing attacks impersonating reputable secure share providers, which are used for securely sharing files.  The lures contain links or attachments containing the supposed document.  Interacting with the link or attachment leads to the installation of credential harvesting malicious software (malwa

    Other Content

    Jun - Nov 2023: Supply Chain Management / Accounts Payable ACH Fraud

     

    Picture of One of the Phish

    2023 ACH Fraud Phish Indicators

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 18
    • Page 19
    • Page 20
    • Page 21
    • Current page 22
    • Page 23
    • Page 24
    • Page 25
    • Page 26
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California