Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


News

Cyber Security Related News

Millions Targeted by Malware Hidden in Fraudulent AI Ads on Facebook

Cybercriminals are using fake Facebook pages and ads to impersonate Kling AI, a popular AI tool for creating images and videos. These ads lead users to fake websites like klingaimedia[.]com, which claim to offer AI services but instead trick visitors into downloading malicious software. The malicious files are hidden in ZIP archives and install a remote access trojan (RAT) that allows attackers to control the victim’s device and steal sensitive information such as passwords and...


May 22, 2025 08:50 (on 5/22/25) |  0 | 1 minute read
Hackers Use Fake AI Sites to Spread Malware to Thousands of Users

Hackers are tricking people into downloading a virus called Noodlophile by using fake AI tools. They create fake websites and promote them on social media.

These fake sites offer AI tools for video and image editing. When users upload content, they’re told to download a file. But instead of the expected results, they download a malicious ZIP file.

The file installs Noodlophile, which can:

  • Steal...
    May 15, 2025 15:05 (on 5/15/25) |  0 | 1 minute read
Company Confirms Hackers Exploited Unpatched Cloud Security Flaw in Recent Breach

A company that stores backups online recently found out that a very skilled group of hackers, likely supported by a government, broke into its system by using a hidden problem that no one knew about before. Even though the system was broken into, there’s no evidence that customer information was looked at or taken, and the company kept running normally.

The company first heard something was wrong in February 2025, and they shared what they knew in March 2025. The hackers used a...


May 8, 2025 15:02 (on 5/8/25) |  0 | 1 minute read
Meta’s WhatsApp Enhances AI Capabilities with Commitment to User Privacy

WhatsApp is rolling out a new feature called Private Processing that lets users take advantage of AI tools — like summarizing unread messages or getting writing suggestions — without giving up their privacy.

The company, owned by Meta, says the new feature keeps your messages secure by processing them in a protected space that even WhatsApp and Meta can’t access. This means you can use helpful AI features without worrying that your chats are being read or...


May 1, 2025 09:13 (on 5/1/25) |  1 | 1 minute read
Fake Crypto Apps Spread Node.js Malware in New Attack Campaign

Microsoft has uncovered a malware campaign that uses fake cryptocurrency apps to spread malicious software. Since October 2024, attackers have been tricking users into downloading what looks like Binance or TradingView installers. These fake apps use Node.js and PowerShell to steal system data and send it to hackers.

The malware avoids detection by disabling Defender scans, stealing sensitive data like browser info, and staying active through scheduled tasks. Some versions use a...


April 24, 2025 08:47 (on 4/24/25) |  0 | 1 minute read
PDF and QR Code Phishing Attacks Spike Ahead of Tax Season, Microsoft Reports

Microsoft is warning about a series of phishing attacks using fake tax-related emails to spread malware and steal user credentials. These scams often include PDF attachments with shortened links or QR codes, which lead to fake websites that look like trusted services (e.g., DocuSign or Microsoft 365).

Some of these attacks use a platform called RaccoonO365, which helps cybercriminals create phishing websites. Once users click the links, they might be tricked into downloading malware...


April 10, 2025 08:39 (on 4/10/25) |  0 | 1 minute read
New Firefox Update Addresses Critical Vulnerability After Chrome's Exploit

Mozilla has released urgent updates for its Firefox browser to fix a security issue that could allow attackers to bypass protective measures. This comes shortly after Google patched a similar vulnerability in Chrome, which had been actively exploited.

The flaw, identified as CVE-2025-2857, could let a compromised part of Firefox’s system access more powerful functions, potentially leading to security risks. Mozilla has addressed the issue in Firefox versions 136.0.4 and 115.21.1, and...


April 3, 2025 08:30 (on 4/3/25) |  0 | 1 minute read
ClearFake Campaign Expands, Compromising Over 9,000 Sites with Fake Security Lures

The ClearFake cyberattack, first discovered in 2023, has grown into a more dangerous threat. Originally using fake browser update pop-ups, ClearFake now tricks people by pretending to be security checks, like fake reCAPTCHA or Cloudflare Turnstile verifications. These false alerts lead users to unknowingly download harmful software, such as Lumma Stealer and Vidar Stealer.

A new tactic called ClickFix has emerged, where attackers fool users into running harmful...


March 27, 2025 11:05 (on 3/27/25) |  0 | 2 minutes read
FBI Warns of Rising Cybercrimes Linked to Free Online File Converters

The FBI Denver Field Office has issued an urgent warning about a rise in cybercrimes involving free online file converters. Criminals are using these services to install malware on users' computers, risking data theft or ransomware attacks. A recent Colorado incident highlights the threat, with cybercriminals targeting individuals seeking free tools to convert or merge files, such as converting Word documents to PDFs. These tools appear legitimate but secretly deliver malicious...


March 20, 2025 08:07 (on 3/20/25) |  0 | 2 minutes read
New Threat Allows Malicious Extensions to Replicate Real Ones and Steal Credentials

Researchers found a new attack where a malicious web extension mimics any installed add-on, copying icons, popups, and workflows. This tricks users into entering credentials, which attackers can use to hijack accounts and steal sensitive data. The attack affects all Chromium-based browsers like Chrome, Edge, Brave, and Opera.

The malicious extension scans for target extensions, changes its icon to match, and disables the legitimate extension using the "chrome.management" API. Google...


March 13, 2025 08:27 (on 3/13/25) |  0 | 1 minute read
  • First
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi