Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3163 Results
Campus IT Operating Model (ITOM) Program
The Campus ITOM Program is a high-priority initiative sponsored by the Chancellor to address and manage the root causes of cybersecurity vulnerabilities.
Oct 2023: TOAD Attack Spoofs Best Buy’s Geek Squad Branding
Threat Alert: TOAD Attack Spoofs Geek Squad Branding
Oct 2023: Business Email Compromise Lures Spoof US Fire Administration
Threat Alert: BEC Lures Imitate US Fire Administration
Oct 2023: Extortion-Themed Phishing Lures Spread Malicious Software
Threat Alert: Extortion-Themed Lure Spreads Malware Cybercriminals have launched a series of phishing attacks using extortion-themed lures regarding alleged explicit photos of the recipient. The messages come from compromised Flickr accounts and contain malicious URLs labeled to appear as explicit or vulgar. The messages threaten to share the photos and claim to have additional explicit i
Oct 2023: Dual-Purpose Phishing Attacks Use Blocked Email Lure
Threat Alert: Dual-Purpose Phish Use Blocked Email Lure
Vulnerabilities in WordPress
WordPress released a security updates to address vulnerabilities in WordPress. For a complete description of the vulnerabilities and affected systems go to WordPress 6.3.2 RC1 is now available. IT Security Read more about IT Security service offerings.
Vulnerability in Zabbix
Zabbix has released security updates to address a vulnerability in Zabbix-Agent. A cyber threat actor could exploit this vulnerability to perform arbitrary code execution. For a complete description of the vulnerabilities and affected systems go to Agent 2 package are built with Go version affected by CVE-2023-24538 (CVE-2023-29453). IT Security
Actively Exploited Vulnerabilities in Apple iOS and iPadOS
Apple has released security updates to address Actively Exploited vulnerabilities in Apple iOS and iPadOS. A cyber threat actor could exploit these vulnerabilities to escalate privileges and perform arbitrary code execution. For a complete description of the vulnerabilities and affected systems go to About the security content of iOS 16.7.1 and iPadOS 16.7.1. IT Security
Vulnerabilities Affecting Multiple SAP Products
SAP released their October 2023 updates to address vulnerabilities in various SAP products. For a complete description of the vulnerabilities and affected systems go to SAP Security Patch Day – October 2023. IT Security Read more about IT Security service offerings.
Vulnerabilities in Chrome
Google has released new versions of Chrome. For a complete description of the vulnerabilities and affected systems go to: Chrome for Android Update