News

All News

January 30, 2026

To the UCB-Security community, 

This is a notice from the Information Security Office to alert you to a high severity vulnerability that impacts MongoDB Server [1]. Please share this alert internally with IT admins and service owners who run the product so they are aware and know what actions to take to address this vulnerability.

To the UCB-Security community, 

This is a notice from the Information Security Office to alert you to a critical vulnerability that impacts WordPress servers using the Modular DS plugin. Please share this alert internally with IT admins and service owners who run the product so they are aware and know what actions to take to address this vulnerability.

December 5, 2025

ISO is aware of a critical, actively exploited vulnerability affecting the React and Next.js ecosystems. Please share this alert internally with IT admins and service owners who run web applications utilizing Next.js or React Server Components (RSC) so they are aware and know what actions to take to address this vulnerability immediately.

September 22, 2025

This phony email is allegedly from a campus department regarding new salary details or a financial bonus.

The message will request you follow a link and enter your CalNet username and password, and often personal cell phone number for your new salary or compensation details.

September 10, 2025

A default setting in bCal may allow anyone from the internet to add you to a Google Calendar invite. This is being used to create fake spam meetings or include potentially malicious links or attachments. Any links included are as dangerous as the ones that would have been included in a phishing email.

What makes this a phishing message?

The non UC Berkeley senders are sourcing @berkeley.edu email addresses and creating the fake meeting, including subjects like:

August 29, 2025

This phony Assessment notification was received by many bMail users. It is part of a credential stealing attempt.

What makes this a phishing message?

The senders email is not a @berkeley.edu email, often a @gmail.com, @outlook.com, or netzero.net account.

This targeted phishing scam uses urgency indicating a task to complete.

The target page below is a non-UC Berkeley Google form. Campus users will never be asked to enter their CalNet credentials in any site other than a UC Berkeley CalNet CAS authentication page.

This fake email is allegedly from a campus member and offers to generously give away musical instruments or sometimes welding tools if only the recipient will pay for shipping.

They will recommend a moving company who will ask you to send money via Zelle, PayPal, or another digital wallet app, wire money, or pay with prepaid debit cards. 

July 25, 2025

Our office has received a number of reports recently of bogus offers for free or discounted convert tickets offered in UCB student platforms (discord, chatgroups, etc.).

July 15, 2025

July 15, 2025: We are starting to see another wave of phishing attacks designed to steal credentials and reroute UCPath Direct Deposit.

What makes these phishing?

The newest fake emails may reference a pending investigation of misconduct, to which they then ask you to enter your CalNet credentials on a very authentic-looking, but fake, CAS page. 

May 15, 2025

We are seeing a spike in sophisticated tactics used to phish for credentials that are then used in concert with other methods to redirect direct deposit routing in UCPath.

These new tactics involve phishing emails, text messages, and highly accurate - but fake - UCPath websites.

April 24, 2025

This is a notice from the Information Security Office to alert you of a medium-severity vulnerability that affects the Trellix HX management console for our EDR agent. This vulnerability can only be exploited by manipulating a previously compromised endpoint agent to send a malformed event to the console. The patch was applied to the console, and no change is needed on the endpoints.

April 17, 2025

Unknown parties are sending fake Google Doc Shares with an urgent subject line. They usually refer to lawsuits or debt collection.

The bad actor is using the same Google Doc service, so the 'from' email will be the service email (via Google Drive)" <drive-shares-noreply@google.com>. The name of the sender

"Lаthаm & Wаtkins Dеbt ...

"MоrgɑnLеwis© - Suppоrt...

is made to sound official but is fake. 

April 9, 2025

Many bMail account holders have recently received fake messages indicating an ACH Payment or Electronic Fund transfer. 

March 13, 2025

The University of California's Cyber-Risk Coordination Center (C3) published its 2024 Annual Report. The report highlights progress in improving cybersecurity across the university. The insights in the report underscore the UC's commitment to staying ahead of emerging threats and continuously improving its cybersecurity posture.

March 11, 2025

We’ve made some changes to our network security setup, which will affect how you experience logging into the campus bSecure VPN.

Why the Change?

  • Better security - This new method allows you to use your preferred browser, so outdated browsers like Internet Explorer (which is no longer supported and receiving security patches) won’t be used. 

January 22, 2025

An ineligible former Summer Session student is attempting to contact faculty directly and be added to many bCourses. 

What makes this a phishing message?

In the Spring of 2024, a very similar incident occurred. The messages are usually send from an @gmail.com account, but may come from @berkeley.edu emails.

January 21, 2025

This phony Staff Assessment notification was received by many bMail users. It is part of a credential stealing attempt.

What makes this a phishing message?

The senders email is not a @berkeley.edu email, likely a compromised account from the Austin, TX school district @austinisd.org

This targeted phishing scam uses urgency indicating a task to complete.

The target page below is a free Jot webform. campus users will never be asked to enter their CalNet credentials in any site that is not a UCB CAS authentication page.

December 4, 2024

This phony email was sent impersonating a UC Berkeley administrative department. It was attempting to get users to click with a bogus $2,250 financial bonus for eligible faculty and staff.

What makes this a phishing message?

The sender is not an @berkeley.edu sender and the login page is NOT an official CalNet CAS page.

This targeted phishing scam uses financial motivation and curiosity to attempt to get campus affiliates to send their usernames, emails, and passwords.

December 2, 2024

This fake email termination message was received by many users allegedly telling them their campus email account would be suspended.

Commonly used phony subject lines include:

'ADVANCE WARNING'

'***Urgent*** Your Account Will Be Suspended'

'ATTENTION!!! Actin Needed Now'

Tips if Something Seems Off:

UC Berkeley Help Desks will NEVER initiate contact directly via test to personal cell phone numbers

This is a fraudulent offer for a remote assistant position. The scammer will impersonate a real UCB professor or department and try to take the conversation offline to a 'personal email' address. 

Common bogus email subject lines include:

'Approved Part - Time Job ( Offer For Staffs & Students )'

'VIRTUAL PERSONAL ASSITANT JOB (REMOTE)'

'**NEW INTERNSHIP OFFER**'

'Internship Opportunities at University of California, Berkeley'

'Research Assistant Position'