Tag: linkedin
-
Was LinkedIn so attraktiv für Cyberkriminelle macht – und wie Nutzer sich schützen
Tags: linkedinDas soziale Netzwerk ist eine riesige, öffentlich zugängliche Datenbank mit Unternehmensinformationen. Das macht LinkedIn zu einem Eldorado für Cybergauner. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/social-media/was-linkedin-so-attraktiv-fur-cyberkriminelle-macht-und-wie-nutzer-sich-schutzen/
-
Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
That LinkedIn message pretending to be job offer could just be malwre. First seen on hackread.com Jump to article: hackread.com/hackers-linkedin-dms-pdf-tools-trojan/
-
ICE Agents Are ‘Doxing’ Themselves
The alleged risks of being publicly identified have not stopped DHS and ICE employees from creating profiles on LinkedIn, even as Kristi Noem threatens to treat revealing agents’ identities as a crime. First seen on wired.com Jump to article: www.wired.com/story/ice-agents-are-doxing-themselves/
-
We’ve Reached the “Customers Want Security” Stage, and AI Is Listening
I’ve seen this movie before. That’s why a recent LinkedIn post by Ilya Kabanov stopped me mid-doomscroll. Kabanov described how frontier AI companies are quietly but decisively shifting into cybersecurity. They are not joining as partners or tacking on features. They are stepping up as product makers, targeting the core of the enterprise security budget……
-
LinkedIn Phishing Abuses DLL Sideloading for Persistent Access
A LinkedIn phishing campaign uses DLL sideloading to gain stealthy, persistent access. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/linkedin-phishing-abuses-dll-sideloading-for-persistent-access/
-
Threat Actors Exploit LinkedIn for RAT Delivery in Enterprise Networks
A sophisticated phishing campaign exploiting LinkedIn private messages has been identified, delivering remote access trojans (RATs) through a combination of DLL sideloading techniques and weaponized open-source Python pen-testing scripts, enabling attackers to establish persistent control over corporate systems while evading traditional security detection. These archives contain four key components: a genuine open-source PDF reader application,…
-
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
Tags: access, cybersecurity, exploit, hacker, linkedin, malicious, malware, open-source, phishing, ratCybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT).The activity delivers “weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script,” ReliaQuest said in a report shared with First…
-
Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/
-
Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/
-
Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/
-
Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/
-
LinkedIn wants to make verification a portable trust signal
Tags: linkedinIn this Help Net Security interview, Oscar Rodriguez, VP Trust Product at LinkedIn, discusses how verification is becoming a portable trust signal across the internet. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/15/oscar-rodriguez-linkedin-identity-verification/
-
Detecting browser extensions for bot detection, lessons from LinkedIn and Castle
Modern bot detection rarely deals with obviously fake browsers. Most large-scale automation today runs inside browser instances, with patched fingerprints, realistic behavior, and few visible automation artifacts. This pushes detection systems toward weaker, contextual signals rather than single hard indicators. Browser extensions are one such signal. Extensions run in separate First seen on securityboulevard.com Jump…
-
Convincing LinkedIn comment-reply tactic used in new phishing
Scammers are flooding LinkedIn posts with fake “reply” comments that appear to come from the platform, warning of bogus policy violations and urging users to click external links. Some even abuse LinkedIn’s official lnkd.in shortener, making the phishing attempts harder to spot. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/
-
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
Tags: bsi, ceo, cloud, cyber, gartner, infrastructure, linkedin, nis-2, resilience, risk-analysis, risk-management, service, vulnerabilityUnternehmen können sich ab sofort über das neue BSI-Portal als NIS2-Einrichtung registrieren und IT-Sicherheitsvorfälle melden.Seit Anfang Dezember gilt die EU-Sicherheitsrichtline NIS2 auch in Deutschland. Rund 29.500 Unternehmen sind dadurch verpflichtet, sich als NIS-2-Einrichtungen zu registrieren und dem Bundesamt für Sicherheit in der Informationstechnik (BSI) erhebliche Sicherheitsvorfälle zu melden. Vor diesem Hintergrund hat das BSI ein…
-
Viele Daten aus LinkedIn – Ungeschützte Datenbank mit 4,3 Milliarden Datensätzen offengelegt
Tags: linkedinFirst seen on security-insider.de Jump to article: www.security-insider.de/ungeschuetzte-mongodb-datenbank-milliarden-datensaetze-entdeckt-a-6ce50b16a844e87e74568390f72c4900/
-
Viele Daten aus LinkedIn – Ungeschützte Datenbank mit 4,3 Milliarden Datensätzen offengelegt
Tags: linkedinFirst seen on security-insider.de Jump to article: www.security-insider.de/ungeschuetzte-mongodb-datenbank-milliarden-datensaetze-entdeckt-a-6ce50b16a844e87e74568390f72c4900/
-
4.3B LinkedIn-Style Records Found in One of the Largest Data Exposures Ever
An unsecured database exposed 4.3 billion LinkedIn-derived records, enabling large-scale phishing and identity-based attacks. The post 4.3B LinkedIn-Style Records Found in One of the Largest Data Exposures Ever appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-4-3-billion-linkedin-records-exposed/
-
4.3 Billion Records Exposed in Massive Lead-Generation Data Leak
An unsecured database exposed 4.3 billion LinkedIn-derived records, enabling large-scale phishing and identity-based attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/4-3-billion-records-exposed-in-massive-lead-generation-data-leak/
-
16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records
Cybersecurity researchers discovered an unsecured 16TB database exposing 4.3 billion professional records, including names, emails, and LinkedIn data. Learn what happened, why this massive data leak enables new scams, and how to protect your PII. First seen on hackread.com Jump to article: hackread.com/mongodb-database-expose-lead-gen-records/
-
16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records
Cybersecurity researchers discovered an unsecured 16TB database exposing 4.3 billion professional records, including names, emails, and LinkedIn data. Learn what happened, why this massive data leak enables new scams, and how to protect your PII. First seen on hackread.com Jump to article: hackread.com/mongodb-database-expose-lead-gen-records/
-
React Flaw Mitigation Leads to Cloudflare Outage
Outage Briefly Took Down Zoom, LinkedIn and Other Websites. Content delivery network giant Cloudflare is investigating a brief outage early Friday that took down multiple websites. The incident marks the second outage in the span of a month, although the causes are unrelated. It stemmed from how Cloudflare’s web application firewall parses requests. First seen…
-
Handala Hacker Group Targets Israeli High-Tech and Aerospace Professionals
A sophisticated cyber intimidation campaign by the Handala hacker group has targeted Israeli high-tech and aerospace professionals, publishing their personal information alongside aggressive, misleading descriptions that falsely label them as criminals. Security researchers monitoring dark web activity discovered the publication, which appears to rely primarily on data scraped from LinkedIn professional profiles. During ongoing dark…

