Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
346 Results
Stop You've Been Phished!
But don't close this page!This phish is authorized by UCSF Information TechnologyHowever, this could have been sent by a criminal and scanning the QR code could have led to a criminal:
IT Administration
Administrative Services is a UCSF IT combined team providing high-touch, cross-functional human resource management and development support for IT leaders and staff across the organization.
IT Finance
The IT Finance and Campus Finance teams are responsible for the stewardship of IT’s financial resources (~$300M in annual spend and ~900 FTE). We ensure both IT’s and the institution's fiscal goals are met in compliance with accounting, regulatory, and other policies.
Jan 2023: Campaign Uses Paycheck Fax-Themed Lure
Threat Alert: What to Watch For Cybercriminals have launched a series of phishing attacks using an emailed fax of an alleged paycheck as a lure.
May 2023: Phishing Attacks Deliver Remote Access Malware
Threat Alert: What to Watch For
May 2023: AI-Themed Phishing Lures Distribute Threats
Threat Alert: What to Watch For Cybercriminals have launched a campaign distributing malware with an AI-themed lure. The lure purports to be from an “Information Technology Manager” regarding a mandatory system update for employees. The email body directs recipients as to how they can download the new AI-powered software.
May 2023: Phishing Attacks Impersonate Secure Share Providers
Threat Alert: What to Watch For Attackers have launched a series of phishing attacks impersonating reputable secure share providers, which are used for securely sharing files. The lures contain links or attachments containing the supposed document. Interacting with the link or attachment leads to the installation of credential harvesting malicious software (malware).
Oct 2023: Israel-Palestine Humanitarian Crisis Donation Scam
Threat Alert: Israel-Palestine Humanitarian Crisis Donation Scam
RAE - Drive Mapping Instructions
Drive Mapping - Windows and Mac InstructionsWindows InstructionsMac InstructionsIt can sometimes be more convenient to map your RAE drive directly to your Windows or Mac device. These instructions will teach you how to do so on both types of devices. A VPN or UCSF network connection is required.Specific share names and paths are supplied in the RAE Welcome letter when signed up.
- Staff
Jun 2023: Phishing Attacks Use Compromised Microsoft Office 365 Accounts
Threat Alert: What to Watch For Cybercriminals have launched phishing attacks leveraging compromised Microsoft Office 365 accounts. The lures include .rpsmg file attachments, as well as embedded URLs hidden behind a “Read the Message” button. Clicking the malicious link leads to a credential phishing kit that redirects the user to a legitimate login page.