Security Alerts
May 7, 2024
April 29, 2024
January 9, 2023
March 31, 2022
December 10, 2021
September 14, 2021
July 27, 2021
April 5, 2021
Updated May 11, 2021:
UCOP Notice to UC Community: https://ucnet.universityofcalifornia.edu/data-security/index.html
Updated Apr. 15, 2021:
March 31, 2021
Mar. 31st - The Internal Revenue Service issued a warning of an ongoing IRS-impersonation scam that appears to primarily target educational institutions, including students and staff who have ".edu" email addresses. The phishing emails appear to target university and college students from both public and private, profit and non-profit institutions.
The fraudulent email displays the IRS logo and uses various subject lines such as "Tax Refund Payment" or "Recalculation of your tax refund payment." It asks people to click a link and submit a form to claim their refund.
February 11, 2021
January 26, 2021
October 15, 2020
June 18, 2020
March 24, 2020
March 13, 2020
Summary
*** Patch Windows 10 and affected Windows Server 2019 systems IMMEDIATELY, even where there is a potential business impact (unscheduled maintenance). Notify security@berkeley.edu if you anticipate delays in patching. ***
January 14, 2020
Summary
*** Vulnerable RD Gateway servers should be patched IMMEDIATELY even where there is a potential business impact (unscheduled maintenance). Notify security@berkeley.edu if you anticipate any delays in patching. ***
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway).
Summary
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. This vulnerability affects the Microsoft Windows 10 desktop operating system, as well as Windows Server 2016 and 2019.
Microsoft has released a security update that addresses the vulnerability by ensuring that Windows CryptoAPI completely validates ECC certificates.
January 13, 2020
Summary
Mozilla has published an out-of-band patch for Mozilla Firefox and Firefox Extended Support Release (ESR). It fixes a type confusion vulnerability in Mozilla’s Javascript compiler, IonMonkey. This vulnerability is identified as CVE-2019-17026. [1]
Mozilla’s advisory states they are “aware of targeted attacks in the wild abusing this flaw.” Based on this note in the advisory, it appears the vulnerability was exploited in the wild as a zero-day. [2]
October 18, 2019
- 1 of 2 Security Alerts (Current page)
- 2 of 2 Security Alerts
- next › Security Alerts
- last » Security Alerts