Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


News

Cyber Security Related News

Deceptive Strategies: Fraudsters Manipulate Genuine IDs for Bank Fraud

Authorities apprehended four members of a fraudulent syndicate engaging in "Frankenstein" fraud, synthetic identity fraud. The suspects utilized valid IDs with authentic photos but filled with false information, deceiving banks into granting loans. The arrest occurred during an entrapment operation conducted by the NBI-Anti-Organized and Transnational Crime Division. The seized IDs displayed varying details such as names, birthdates, and addresses, shedding light on the elaborate nature of...


December 4, 2023 09:02 (on 12/4/23) |  0 | 2 minutes read
Telekopye Telegram Bot Empowers Cybercriminals in Orchestrating Large-Scale Phishing Schemes

In recent revelations, a cybersecurity analysis has brought to light the nefarious activities of a Telegram bot known as Telekopye, utilized by threat actors, codenamed Neanderthals, to orchestrate large-scale phishing scams. ESET security researcher Radek Jizba delves into the functionality of Telekopye, explaining its capability to craft phishing websites, emails, SMS messages, and more. What adds an additional layer of sophistication to this...


November 28, 2023 08:33 (on 11/28/23) |  0 | 2 minutes read
Enhanced FCC Measures Safeguard Customers from SIM Swapping Threats

The U.S. Federal Communications Commission (FCC) is taking decisive action to counteract the rising threat of SIM-swapping attacks and port-out fraud within cell phone account scams. These fraudulent activities expose consumers to risks such as unauthorized access to personal data and the compromise of sensitive information.

The new rules, initially proposed in July 2023, mandate wireless...


November 21, 2023 08:42 (on 11/21/23) |  0 | 2 minutes read
Beware: Counterfeit Skills Assessment Platforms Exploiting IT Job Hunters, Microsoft Alerts

A faction within the well-known Lazarus Group, identified as Sapphire Sleet (also known as APT38, BlueNoroff, CageyChameleon, and CryptoCore), has recently established deceptive infrastructure mimicking skills assessment portals. Microsoft, which detected this activity, notes it as a notable shift in the persistent actor's tactics. 

Sapphire Sleet has a history of orchestrating...


November 15, 2023 15:55 (on 11/15/23) |  0 | 1 minute read
Google's Alert: Unveiling Potential Exploits of Calendar Service as a Hidden C2 Communication Channel

Google has issued a warning regarding a potential threat wherein multiple actors are sharing a public proof-of-concept (PoC) exploit, known as the Google Calendar RAT (GCR). This tool utilizes Google Calendar Events within a Gmail account for command-and-control (C2) purposes. While it was first made public on GitHub in June 2023, it has not been observed in real-world usage as of yet. Nevertheless, Google's Mandiant threat intelligence unit has...


November 7, 2023 08:34 (on 11/7/23) |  0 | 2 minutes read
Google's Enhanced Bug Bounty Initiative Takes Aim at AI Security Risks

Google is expanding its Vulnerability Rewards Program (VRP) to reward researchers who uncover potential threats specific to generative artificial intelligence (AI) systems. This initiative aims to enhance AI safety and security by addressing concerns like unfair bias, model manipulation, and data misinterpretations associated with generative AI. The program covers various categories, including prompt injections, data leakage from training datasets,...


November 2, 2023 10:06 (on 11/2/23) |  0 | 1 minute read
Malvertisers Leverage Google Ads to Target Individuals In Search for Popular Software

New information has surfaced regarding a malicious advertising campaign that exploits Google Ads to direct users searching for popular software to fake landing pages and distribute subsequent-stage malware.

Malwarebytes, the organization that uncovered this activity, noted its uniqueness in user fingerprinting and the distribution of time-sensitive payloads. This attack targets individuals...


October 24, 2023 08:00 (on 10/24/23) |  0 | 2 minutes read
Android Espionage Alert: Unmasking SpyNote, the Covert Audio Recording Trojan

The Android banking trojan, SpyNote, has been thoroughly examined to uncover its multifaceted data-gathering capabilities. Typically distributed through SMS phishing campaigns, this spyware tricks potential victims into installing it by luring them to click on embedded links. Once installed, SpyNote seeks invasive permissions to access call logs, the camera, SMS messages, and external storage. It excels at concealing its presence on the Android...


October 17, 2023 08:16 (on 10/17/23) |  0 | 2 minutes read
Google Revolutionizes User Security with Passkeys as Default Sign-in Method

Google has made a significant stride in user security by implementing default passkeys for all its users. This move comes five months after the company initially rolled out support for the passwordless standard for Google Accounts, as advocated by the FIDO Alliance, across all platforms.

What this means is that the next time users log into their Google accounts, they will encounter prompts to...


October 10, 2023 09:15 (on 10/10/23) |  0 | 2 minutes read
FBI Alerts to Growing Trend: U.S. Companies Facing Increasing Dual Ransomware Threats

There have been reports of dual ransomware attacks on US companies since July 2023. These attacks involve the use of two different ransomware strains, including AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal, in various combinations. It is unclear how widespread these attacks are, but they are believed to occur within a short timeframe, ranging from 48 hours to 10 days apart. It's important to be vigilant and take necessary...


October 4, 2023 07:53 (on 10/3/23) |  0 | 2 minutes read
  • First
  • «
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi