• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Contact
    • Partners
  • Consulting
    • Virtual Chief Information Officer (vCIO)
    • Virtual Chief Information Security Officer (vCISO)
    • Virtual Chief Infection Prevention Officer (vCIPO)
    • Engagement Paths
  • Services
    • Managed IT Services
    • Technology Acquisition
  • Product Search
  • Blog

Adevonix

Blog

February 14, 2025 By adevonix

How good are you at protecting your own privacy?

As I write this post today, social media platforms continue collecting extensive user behavioral data. Here’s a simplistic overview of the personal behavioral data on a select set of prominent mobile communication platforms. The list is simply a sample based on what I see first-hand people use on their mobile phones.

CAVEAT: I am not creating an all-inclusive list but an ad-hoc sample to get you thinking when using these types of applications!

LinkedIn

LinkedIn is known to gather professional and career-related behavioral data, including:

  • Profile views and interactions
  • Job search activities
  • Content engagement (posts, articles, comments)
  • Connection patterns and networking behaviors
  • Skills endorsements and recommendations

TikTok

TikTok collects a vast array of behavioral data:

  • Video viewing habits and duration
  • Content creation patterns
  • Engagement metrics (likes, comments, shares)
  • User-generated sound and hashtag usage
  • Device and in-app activity information
  • TikTok’s data collection is pervasive. The app retrieves information about users’ devices, geographic locations, and network connections.

Instagram

Instagram, owned by Meta (formerly Facebook), gathers substantial behavioral data:

  • Photo and video viewing patterns
  • Story and Reel engagement
  • Direct messaging activities
  • Shopping and product interaction behaviors
  • Location check-ins and geotags
  • Instagram tracks user interactions with content, including likes, comments, and saved posts. It also collects data on the accounts users follow and their engagement with hashtags.

Snapchat

Snapchat focuses on ephemeral content but still collects significant behavioral data:

  • Snap creation and sending patterns
  • Story viewing habits
  • Discover content engagement
  • Bitmoji usage and customization
  • Lens and filter application behaviors
  • Snapchat can access detailed information about users’ interactions, including who receives snaps, how often users are online, and even metadata from images.

All these platforms and others on the Internet use the collected behavioral data to personalize user experiences, refine content algorithms, and deliver targeted advertising. Users should be aware that their activities on these platforms contribute to detailed behavioral profiles, which can be used for various purposes, including marketing and product development.

To protect privacy, users should regularly review and adjust privacy settings on each platform, be mindful of the content they share, and consider using more privacy-focused alternatives for sensitive communications.  This is not only because you should not trust these organizations with your behavioral data, but most especially when, not if, they get breached, your behavioral data will be collected and then used for far worse and nefarious purposes by a malicious actor. 

It is a complex digital world out there. Think before you communicate on a platform about the information’s potential use by the vendor’s “good guys,” a debatable concept, but never forget about the bad guys either!

Filed Under: Cybersecurity

October 22, 2020 By adevonix

Solaris 10 & 11 PAM Vulnerability October 2020

Pluggable Authentication Module (PAM) Vulnerability

Oracle Solaris 10 & 11 operating systems have a pretty small market share today compared to other operating systems such as Linux and Microsoft Windows. However, over 50% of Solaris deployments are at medium and large organizations in the United States.

In Oracle’s October 2020 patch update, (CVE-2020-14871) is a level 10 (the highest) critical vulnerability in the pluggable authentication module (PAM) of Oracle Solaris. The flaw is locally and remotely exploitable without user credentials, requires no user interaction, and can be implemented as a “low-complexity” attack. Although there are no currently known published exploits, the low-complexity nature of the vulnerability combined with privilege escalation is why CVE-2020-14871 received the CVE level 10 criticality rating.

If you are a business or government agency that relies on Oracle Solaris for your computational workload, be sure you get this patch applied to your systems as soon as possible.

Linked Information

If you use Oracle VM VirtualBox, the same PAM vulnerability applies as well. Download the latest VirtualBox 6.1.32 from Oracle to address the patch.

The entire 2020 list of Oracle vulnerabilities patched in the October patch update. https://www.oracle.com/security-alerts/cpuoct2020.html

The specifics for Solaris 10/11 in regard to CVE-2020-14871 https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixSUNS

Filed Under: Cybersecurity

September 21, 2020 By adevonix

Microsoft Vulnerability CVE-2020-1472 “Zerologon”

A patch was released by Microsoft in August of 2020 for this level 10 critical security vulnerability reported by Tom Tervoort, Senior Security Researcher at Secura.

When the patch was released in August, there were no reported exploits publicly published. However, on Monday, September 14th, The Cybersecurity and Infrastructure Agency (CISA) reported finding a publicly published exploit of “Zerologon”.

Best practice is to always “patch early and often” but the publishing of the exploit raises the urgency to get systems patched. The service “Netlogon” is the vulnerable service that has the “Zerologon” vulnerability that can be exploited.

If you haven’t patched your Windows servers and especially your domain controllers, we highly suggest you get it scheduled ASAP!

You can read more detail from the Software Engineering Institute’s CERT Coordination Center. Additionally in the CERTCC report, there is content on further mitigation that can be performed that will also be part of a second round of patching from Microsoft in the February 2021 timeframe.

Filed Under: Cybersecurity Tagged With: patch, vulnerability

March 27, 2020 By adevonix

Cybersecurity in cloud-based infrastructure – It’s inherent when I choose to use the cloud. Right?

Well, no.

Cybersecurity in cloud infrastructure is a shared responsibility model. What most businesses don’t realize is that the majority of the shared responsibility is on the company, not the cloud services provider.

The cloud services vendor provides a core level of security, high-availability, and physical security of its resources that constitute its cloud infrastructure services offerings. It is up to the business to leverage the solutions they provide and also integrate their tools to provide comparable security capabilities to what is sometimes easier to do with on-premise computing.

Just like the on-premise model, the business is responsible for the deployed cloud computing systems and their updates, patching, and general management to include the associated data that is also in the cloud. Whether your business uses Google, Microsoft, or Amazon or another provider’s cloud services, there are a lot of cloud security and management solutions available.

At Adevonix, we are here to help you make decisions about acquisitions and deployments that are right for your business that takes into account your budget and risk. Contact us!

Filed Under: Cybersecurity Tagged With: cloud, cybersecurity, infrastructure, shared responsibility

Primary Sidebar

RSS SEI Blog

  • A 5-Stage Process for Automated Testing and Delivery of Complex Software Systems May 21, 2025
  • Stop Imagining Threats, Start Mitigating Them: A Practical Guide to Threat Modeling May 15, 2025
  • 10 Things Organizations Should Know About AI Workforce Development April 28, 2025

RSS Cisco Security Topics

  • Simplifying Zero Trust: How Cisco Security Suites Drive Value May 20, 2025
  • Developing With Cisco XDR at Cisco Live San Diego ‘25 May 19, 2025
  • Market-Inspired GPU Allocation in AI Workloads: A Cybersecurity Use Case May 15, 2025

RSS Cybersecurity News: Get the Latest Trends & Threats | Cisco Umbrella

  • Where Do I Start With SASE Evaluations? Gartner® Report
  • Cisco Umbrella for Government: DNS Security Integrated With CISA Protective DNS
  • Cisco Umbrella: A Leader in the GigaOm Radar for DNS Security

Footer

Adevonix LLC

10816 Town Center Blvd
Suite 345
Dunkirk, Maryland 20754
NAICS: 541519
D-U-N-S®: 117037899
CAGE:8B2S2

Member Calvert County Chamber of Commerce
Veteran-Owned Small Business
  • LinkedIn

Copyright © 2019–2025 · Adevonix LLC· Log in