December 27, 2018
December 20, 2018
Microsoft just published an out-of-band patch for Internet Explorer. It fixes a memory corruption vulnerability in the scripting engine. This vulnerability is identified as CVE-2018-8653.
When successfully exploited, Internet Explorer could execute arbitrary code in the context of the current user. To exploit the vulnerability, the victim must just visit a malicious web page delivered through a phishing email or social engineering. 
October 4, 2018
The goal of National Cyber Security Awareness Month (NCSAM) – celebrated every October – is to ensure that all Americans have the resources they need to stay safer and more secure online. Check out these offerings to find an event near you, or a webinar of interest.
Oct 16, 11AM-1PM
UCOP Cyber Security Awareness Month Forum
UCOP, 1111 Franklin St., Oakland, CA, Lobby 1 Conference Room
September 25, 2018
To our campus community,
We are implementing some necessary updates to our Wi-Fi network that will require some action on your part. On Oct. 2, 2018 at 7 a.m., the Airbears2 and eduroam wireless networks will be updated with a new certificate. After this update is complete, devices attempting to connect to either wireless network will be presented with a message similar to one of the three examples shown below (message will vary based on the device and operating system you are using):
Example 1: MacOS X 10.13 (MacBook Air)
September 19, 2018
August 23, 2018
A critical remote code execution vulnerability has been discovered in Apache Struts, a popular open source framework for developing web applications in the Java programming language.  In the past, Apache Struts RCE vulnerabilities have been weaponized in less than 24 hours -- one of which resulted in the Equifax breach that totaled over $600 million in cost. 
August 17, 2018
A vulnerability has been discovered in Oracle Database that could allow for complete compromise of the database, as well as shell access to the underlying server.  . The vulnerability resides in the Java Virtual Machine component of the Oracle Database Server and does not require user interaction. The vulnerability allows low-privileged attackers that have Create Session privilege with network access via Oracle Net to compromise the Java VM component.
August 8, 2018
If you an IT Security professional and want to join a talented and dynamic team, check out our available job openings at: https://security.berkeley.edu/about/job-postings
July 12, 2018
NSF’s new Research Terms and Conditions (effective March 1, 2018) require recipients of NSF funding to protect Personally Identifiable Information within the scope of an NSF award. Article 35 states:
July 9, 2018
The Campus Policy for Minimum Security Standards for Electronic Information (MSSEI)  requires departments to register computer systems and applications containing restricted data. Restricted Data is defined as "any confidential or personal information that is protected by law or policy, and that requires the highest level of access control and security protections whether in storage or in transit"  and further refined based on adverse business impact into "High" or Protection Level 2 and "Moderate" or Protection Level 1. 
June 12, 2018
April 26, 2018
March 28, 2018
NOTE: Drupal core developers have stated that exploits for this vulnerability will likely be developed within days. Drupal site owners must take action immediately or risk complete compromise of their sites.
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. 
This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. 
March 14, 2018
The IST-Telecommunications networking group will begin piloting the new bSecure Campus VPN service in the coming weeks. Eventually, this service will become the replacement for the existing Cisco AnyConnect based Campus Remote Access VPN service.
March 2, 2018
Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. 
February 22, 2018
January 31, 2018
The bSecure team would like to provide an update on our planned migration to the new firewall services in the Data Center.
Data Center Firewall Administrator Training
As previously announced, we will be holding two on-campus training sessions for Data Center Firewall Administrators. Both sessions are identical, so you only need to attend one. The Dates for these one day sessions will be:
January 19, 2018
The Internal Revenue Service has reported a big spike in phishing and malware incidents during the 2016 and 2017 tax seasons.
January 12, 2018
The bSecure project team would like to provide the Campus IT community, and especially administrators of existing firewall services, with an update on the planned migration to the new service, and information on what to expect next.
January 5, 2018
A team of security researchers disclosed several software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from many types of computing devices with many different vendors’ processors and operating systems.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.