Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


News

Cyber Security Related News

Fake FreeConference App Used by North Korean Hackers to Attack Job Seekers

North Korean hackers have used a fake Windows video conferencing app that pretends to be FreeConference.com to secretly access developers' systems. This is part of an ongoing campaign called Contagious Interview, which is financially motivated.

In August 2024, the Singaporean company Group-IB discovered this new attack. It shows that these hackers are also using installers for both Windows and Apple macOS to spread malware.

Contagious Interview, also known as DEV#POPPER, is a...


September 4, 2024 20:30 (on 9/5/24) |  0 | 1 minute read
RansomHub Group Introduces Tool to Disable Endpoint Security in Latest Attacks

A new cyber threat has emerged, connected to the RansomHub ransomware, designed to shut down security software on infected computers. Named EDRKillShifter by the cybersecurity company Sophos, this tool joins other similar programs that disable security measures. 

Sophos discovered EDRKillShifter during a failed ransomware attack in May 2024. This tool acts as a delivery system for vulnerable drivers, which can be misused to bypass security protections. Security expert Andreas...


August 21, 2024 16:50 (on 8/21/24) |  2 | 1 minute read
New Phishing Tactic Relies on Google Drawings and WhatsApp URL Shorteners

A new phishing campaign is exploiting Google Drawings and WhatsApp’s shortened links to deceive users and steal sensitive data. Cybersecurity researchers, including Menlo Security's Ashwin Vamshi, revealed that attackers are using these trusted platforms to craft fake Amazon account verification pages.

The scheme begins with a phishing email directing users to a Google Drawings graphic containing a link to a fake Amazon login page. This page, obscured by multiple URL shorteners,...


August 14, 2024 17:46 (on 8/15/24) |  0 | 1 minute read
Fraudulent Websites Target Facebook Users Through Deceptive Ads

Facebook users are being targeted by a scam involving a network of fake websites designed to steal personal and financial information. Identified by Recorded Future’s Payment Fraud Intelligence team on April 17, 2024, this scam, named ERIAKOS, uses the content delivery network oss.eriakos[.]com. The fraudulent sites are only accessible through mobile devices and misleading ads, making them harder for automated systems to detect. The network includes 608 fake websites and operates in short,...


August 7, 2024 17:00 (on 8/8/24) |  0 | 1 minute read
New Security Protocol: Singapore Banks to Drop OTPs for Digital Tokens

Singapore's retail banking sector has been given a three-month deadline to eliminate the use of one-time passwords (OTPs) for online account authentication, according to a joint announcement by the Monetary Authority of Singapore (MAS) and the Association of Banks in Singapore (ABS) on July 9, 2024. 

To combat the growing threat of phishing attacks, banks will transition to using digital tokens for customer logins. The MAS stated, "Customers who have activated their digital...


July 31, 2024 19:33 (on 8/1/24) |  0 | 1 minute read
Eavesdrop No More: Apple's Swift Action on AirPods Bluetooth Bug

Apple has issued a firmware update for AirPods addressing a security flaw that could potentially allow unauthorized access to the headphones. Identified as CVE-2024-27867, the vulnerability impacts various models including AirPods (2nd generation and later), AirPods Pro, AirPods Max, Powerbeats Pro, and Beats Fit Pro. 

According to Apple's advisory released on Tuesday, the issue involves an authentication weakness during...


July 24, 2024 18:12 (on 7/25/24) |  0 | 1 minute read
Uncovering Online Criminal Networks: Malware Logs and the Sale of Illegal Content

An investigation into malware logs on hidden internet platforms revealed thousands of users accessing illegal images of children. This discovery underscores how such data can aid in combating serious crimes. Recorded Future reported finding about 3,300 users with accounts on websites known for these images, and 4.2% had credentials for multiple sites, suggesting involvement in criminal activities. Recently, easily accessible software designed to steal sensitive information like passwords,...


July 18, 2024 20:50 (on 7/19/24) |  1 | 1 minute read
China-linked APT40's Swift Exploit Adaptation Triggers Cybersecurity Alerts

Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have issued a warning about a China-linked hacking group called APT40. This group can exploit new security flaws very quickly, sometimes within hours or days of their discovery.

APT40 has targeted organizations in various countries, including Australia and the U.S. They are known for quickly adapting and using proof-of-concept vulnerabilities for attacks. This group, also...


July 10, 2024 18:01 (on 7/11/24) |  1 | 2 minutes read
Rising Ransomware: The Role of MFA Failures in a 500% Increase in Losses

The cybersecurity landscape has seen a shocking increase in ransomware payments, soaring over 500% recently. According to Sophos' "State of Ransomware 2024" report, organizations now pay an average of $2 million, up from $400,000 last year. Similarly, RISK & INSURANCE reported median ransom demands jumping to $20 million in 2023 from $1.4 million in 2022, with payments climbing to $6.5 million from $335,000 in the same period. 

  

This rise highlights the...


July 3, 2024 18:27 (on 7/4/24) |  0 | 1 minute read
Ransomware Hits Over 500 Targets Globally, Spanning North America, Europe, and Australia

Since April 2022, the Black Basta ransomware group has attacked over 500 organizations in North America, Europe, and Australia. A report from CISA, FBI, HHS, and MS-ISAC shows that they have targeted 12 of the 16 main critical infrastructure sectors, encrypting and stealing data. Black Basta commonly uses phishing and known software flaws to break in, then demands money by threatening to publish stolen data if not paid. Instead of giving a ransom amount u


Source: May 13, 2024 20:16 (on 5/14/24) |  0 | 1 minute read

  • First
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • »
  • Last


  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi