Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


News

Cyber Security Related News

New Security Protocol: Singapore Banks to Drop OTPs for Digital Tokens

Singapore's retail banking sector has been given a three-month deadline to eliminate the use of one-time passwords (OTPs) for online account authentication, according to a joint announcement by the Monetary Authority of Singapore (MAS) and the Association of Banks in Singapore (ABS) on July 9, 2024. 

To combat the growing threat of phishing attacks, banks will transition to using digital tokens for customer logins. The MAS stated, "Customers who have activated their digital...


July 31, 2024 19:33 (on 8/1/24) |  0 | 1 minute read
Eavesdrop No More: Apple's Swift Action on AirPods Bluetooth Bug

Apple has issued a firmware update for AirPods addressing a security flaw that could potentially allow unauthorized access to the headphones. Identified as CVE-2024-27867, the vulnerability impacts various models including AirPods (2nd generation and later), AirPods Pro, AirPods Max, Powerbeats Pro, and Beats Fit Pro. 

According to Apple's advisory released on Tuesday, the issue involves an authentication weakness during...


July 24, 2024 18:12 (on 7/25/24) |  0 | 1 minute read
Uncovering Online Criminal Networks: Malware Logs and the Sale of Illegal Content

An investigation into malware logs on hidden internet platforms revealed thousands of users accessing illegal images of children. This discovery underscores how such data can aid in combating serious crimes. Recorded Future reported finding about 3,300 users with accounts on websites known for these images, and 4.2% had credentials for multiple sites, suggesting involvement in criminal activities. Recently, easily accessible software designed to steal sensitive information like passwords,...


July 18, 2024 20:50 (on 7/19/24) |  1 | 1 minute read
China-linked APT40's Swift Exploit Adaptation Triggers Cybersecurity Alerts

Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have issued a warning about a China-linked hacking group called APT40. This group can exploit new security flaws very quickly, sometimes within hours or days of their discovery.

APT40 has targeted organizations in various countries, including Australia and the U.S. They are known for quickly adapting and using proof-of-concept vulnerabilities for attacks. This group, also...


July 10, 2024 18:01 (on 7/11/24) |  1 | 2 minutes read
Rising Ransomware: The Role of MFA Failures in a 500% Increase in Losses

The cybersecurity landscape has seen a shocking increase in ransomware payments, soaring over 500% recently. According to Sophos' "State of Ransomware 2024" report, organizations now pay an average of $2 million, up from $400,000 last year. Similarly, RISK & INSURANCE reported median ransom demands jumping to $20 million in 2023 from $1.4 million in 2022, with payments climbing to $6.5 million from $335,000 in the same period. 

  

This rise highlights the...


July 3, 2024 18:27 (on 7/4/24) |  0 | 1 minute read
Ransomware Hits Over 500 Targets Globally, Spanning North America, Europe, and Australia

Since April 2022, the Black Basta ransomware group has attacked over 500 organizations in North America, Europe, and Australia. A report from CISA, FBI, HHS, and MS-ISAC shows that they have targeted 12 of the 16 main critical infrastructure sectors, encrypting and stealing data. Black Basta commonly uses phishing and known software flaws to break in, then demands money by threatening to publish stolen data if not paid. Instead of giving a ransom amount u


Source: May 13, 2024 20:16 (on 5/14/24) |  0 | 1 minute read

Dropbox Sign Breach Exposes User Data: Investigation and Response Underway

Dropbox, the cloud storage services provider, disclosed a significant breach affecting its digital signature service, Dropbox Sign (formerly known as HelloSign). This breach, discovered on April 24, 2024, resulted in unauthorized access by unidentified threat actors to user emails, usernames, and general account settings associated with all users of the digital signature product. Additionally, for certain subsets of users, the attackers accessed...


May 8, 2024 22:52 (on 5/9/24) |  0 | 2 minutes read
Google Delays Third-Party Cookie Phaseout Amid U.K. Regulatory Examination

Google has delayed its plan to remove third-party tracking cookies from its Chrome browser amid ongoing concerns from U.K. regulators about its Privacy Sandbox initiative. The company is working closely with the U.K. Competition and Markets Authority (CMA) to address these issues and hopes to reach an agreement by the end of the year. 

The new timeline involves beginning the phase-out of...


April 25, 2024 21:39 (on 4/26/24) |  0 | 2 minutes read
Unaddressed Vulnerability Found in Lighttpd Server Embedded in Intel and Lenovo BMCs

Binarly's recent findings reveal a security loophole in the Lighttpd web server utilized within baseboard management controllers (BMCs), left unaddressed by major device manufacturers like Intel and Lenovo. Originally discovered and patched by Lighttpd maintainers in August 2018, the absence of a CVE identifier or advisory led to its oversight by developers of AMI MegaRAC BMC, thus integrating it into Intel and Lenovo products.

April 15, 2024 23:28 (on 4/16/24) |  0 | 2 minutes read

Google Chrome Introduces V8 Sandbox to Bolster Security

Google has unveiled support for the V8 Sandbox in its Chrome web browser, aiming to combat memory corruption issues. According to Samuel Groß, the V8 Security technical lead, the sandbox prevents the spread of memory corruption within the host process. 

Described as a lightweight, in-process sandbox for the JavaScript and WebAssembly engine, the V8 Sandbox mitigates common vulnerabilities....


April 8, 2024 17:26 (on 4/9/24) |  0 | 2 minutes read
  • First
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi