Skip to main content
University of California San Francisco Give to UCSF

UCSF IT Technology

Main navigation

  • About Us
    • About Us
    • Mission Areas
    • IT Directory
    • Standards and Guidelines
  • Services
    • Services
    • Status
    • Security Announcements
  • Initiatives
    • Initiatives
    • AI at UCSF
    • IT Operating Model (ITOM)
    • Project Echo
    • Project One
    • Lift & Shift | Drupal 7-to-Drupal 10 Update Project
    • Digital Accessibility Compliance Project
  • News & Events
    • News & Events
  • How-To Articles
  • Log In
Open Close Search
Open menu
Give to UCSF

Breadcrumb

  1. Home
  2. Search

    Log in to see all content. Some content is hidden to the public.

    Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.

    Type

    • Event (20)
    • Homepage (1)
    • How-To (639)
    • Landing Page (55)
    • News (134)
    • Other Content (638)
    • Service (164)
    • Standard & Guideline (41)
    • Status (831)

    Service Category

    • Access & Identity (29)
    • Business Applications (152)
    • Desktop Support (63)
    • Education Applications (17)
    • Email & Collaboration (158)
    • Health Systems (13)
    • Hosting & Computing (30)
    • Network & Wireless (34)
    • Phones & Pager (15)
    • Research Services (40)
    • Security (52)
    • Web Services (119)

    2523 Results

    • Event
    • Homepage
    • How-To
    • Landing Page
    • News
    • Other Content
    • Service
    • Standard & Guideline
    • Status
    • Access & Identity
    • Business Applications
    • Desktop Support
    • Education Applications
    • Email & Collaboration
    • Health Systems
    • Hosting & Computing
    • Network & Wireless
    • Phones & Pager
    • Research Services
    • Security
    • Web Services
    Other Content

    Zoom Patches Critical Vulnerability in Windows Applications

    Zoom has released a security bulletin to address a critical vulnerability in its Windows applications. The attack is described as an improper input validation that could allow an attacker with network access to escalate privileges.For a complete description of the vulnerabilities and affected systems go to Zoom Security Bulletin.IT SecurityRead more about IT Security service offerings.

    Other Content

    Jun - Nov 2023: Supply Chain Management / Accounts Payable ACH Fraud

     

    Picture of One of the Phish

    2023 ACH Fraud Phish Indicators

    Other Content

    Aug 2017: Supply Chain Management / Vendor Relations ACH Fraud

    Picture of Real Phish

    2017 Real ACH Phish Indicators

    Threat Alert: Fraudul

    Other Content

    Feb: 2024: Real Phish Received at UCSF - Payroll Lure Harvesting Credentials

    Picture of Actual Phish:

    HR Lure Phish Indicators

    Picture of Actual Landi

    Other Content

    Feb 2024: Deepfake Scam Imitating CFO

    Threat Alert: Deepfake Scam Targeting Financial Transactions An employee attended a video conference call with seemingly authentic colleagues, all of whom were later revealed to be deepfake representations. The worker, initially suspicious of a phishing email, was convinced by the realistic appearance and voices of the deepfake participants during the video call. Subsequently, the employee authorized a large financial transaction, thinking it was a legitimate request initiated by the CFO. 

    Landing Page

    Office of the CIO

    In support of UCSF’s most important priorities, the Office of the CIO teams facilitate the alignment of IT people, strategy, investments, and the IT operating model.

    Other Content

    Jan 2024: Policy Update Phishing Lures Bypass MFA

    Threat Alert: Company Policy Phishing Lures Bypass MFA 

    Other Content

    Critical Vulnerability Impacting GoAnywhere MFT

    The newly disclosed flaw is tracked as CVE-2024-0204 and is rated critical with a CVSS v3.1 score of 9.8 as it is remotely exploitable, allowing an unauthorized user to create admin users via the product’s administration portal. Creating arbitrary accounts with administrative privileges can lead to a complete device takeover. In the case of Go Anywhere MFT, that would allow attackers to access sensitive data, introduce malware, and potentially enable further attacks within the network.

    How-To

    Staffbase Add-In Missing in Account

    As a communicator, I am attempting to send a communication to a large amount of users at UCSF through the Staffbase email add-in. When I attempt to access Staffbase from my resource account in the Outlook Web App, the Staffbase add-in does not appear when I select the add-ins icon. The following video and steps to follow will assist you in sending your communication despite the add-in being missing.

    • Affiliate
    • Faculty
    • Staff
    • Student
    • Technical Partner
    • Volunteer
    • Email & Collaboration
    Other Content

    Lantern Loader

    Arjabi 

    About integration services team 

    Pagination

    • First page « First
    • Previous page ‹ Previous
    • …
    • Page 79
    • Page 80
    • Page 81
    • Page 82
    • Current page 83
    • Page 84
    • Page 85
    • Page 86
    • Page 87
    • …
    • Next page Next ›
    • Last page Last »
    Home

    Footer Col 1

    • Status
    • Services
    • How To
    • News & Events

    Footer Col 2

    • About
    • IT Directory
    • Standards & Guidelines

    Footer Col 3

  • Get Help
  • Recognize IT Staff
  • Submit a Support Inquiry

    For emergencies and high priority issues please call the IT Service Desk (415) 514-4100

    • Facebook
    • Twitter
    • YouTube
    • Instagram

    © 2025 The Regents of the University of California