Articles tagged "LinkedIn"

Found 9 articles

Recent allegations suggest that Microsoft is engaging in corporate espionage through its LinkedIn browser extension, raising concerns about user privacy. However, security researchers are analyzing these claims and have found mixed results regarding the extent of data collection by the extension. While some users are worried about their information being tracked or misused, the research indicates that the data collection practices may not be as invasive as initially claimed. This debate over LinkedIn's data handling practices is crucial as it could impact user trust and privacy standards across similar platforms. Understanding the reality behind these accusations is important for users who rely on LinkedIn for networking and job opportunities.

Impact: LinkedIn browser extension
Remediation: Users should review their privacy settings on LinkedIn and consider limiting permissions for the browser extension.
Read Original
BrowserGate: LinkedIn Tracks 6,000+ Browser Extensions on Users’ PCs

Hackread – Cybersecurity News, Data Breaches, AI and More

LinkedIn is facing scrutiny after a report revealed that it tracks over 6,000 browser extensions installed on users' devices. This practice raises serious privacy concerns, as many users may not be aware that their browsing habits could be monitored through these extensions. The BrowserGate report emphasizes that such extensive tracking can lead to potential misuse of personal data. Users of LinkedIn, especially those who rely on various browser extensions for productivity, should be aware of this issue and consider the implications for their privacy. The situation calls for a closer examination of data collection practices by major platforms and how they handle user consent.

Impact: LinkedIn users, browser extensions
Remediation: Users should review and manage their browser extensions, limit permissions, and consider using privacy-focused browsers or tools that block tracking.
Read Original

Cybercriminals are sending out fake LinkedIn alert messages that claim to offer job opportunities, but their real goal is to steal user credentials. This phishing campaign tricks recipients into providing sensitive information, putting their accounts at risk. The fraudulent messages imitate legitimate notifications from LinkedIn, making them difficult to detect. Users who fall for this scam could find their personal data compromised, leading to potential identity theft or unauthorized access to their accounts. It's essential for LinkedIn users to be cautious and verify messages before clicking on any links or providing information.

Impact: LinkedIn accounts
Remediation: Users should verify the authenticity of job alerts directly through LinkedIn's official site and avoid clicking on suspicious links. It is also advisable to enable two-factor authentication for added security.
Read Original

Phishing scammers have been impersonating recruiters from Palo Alto Networks to trick job seekers since August. These fraudsters have used psychological tactics and personal information gleaned from LinkedIn profiles to create convincing fake job offers. Victims are often led to believe they are in the running for legitimate positions, only to be scammed out of money or personal information. This ongoing scheme not only targets job seekers but also potentially damages the reputation of the real company. It's crucial for job candidates to verify the authenticity of job offers and be cautious when sharing personal details online.

Impact: Palo Alto Networks job seekers
Remediation: Job candidates should verify the legitimacy of recruiters and job offers, especially those received via LinkedIn. Use official company channels to confirm job postings.
Read Original
Fake LinkedIn Interview Used by Lazarus Hackers to Target AllSecure CEO

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Researchers at AllSecure have uncovered a sophisticated phishing attempt by North Korean hackers from the Lazarus Group, targeting their CEO using a fake LinkedIn job interview. The attackers employed deepfake technology to create a convincing impersonation, aiming to extract sensitive information. This incident showcases the evolving tactics used by cybercriminals, particularly in social engineering, and highlights the risks that executives face in the digital age. With the rise of deepfake technology, companies need to be vigilant about potential impersonation scams that could compromise their security. This attack not only affects the targeted individual but also raises concerns for the entire organization and its stakeholders.

Impact: LinkedIn, AllSecure
Remediation: Companies should implement strict verification processes for job interviews and communications, particularly through social media platforms. Training employees on recognizing deepfake technology and potential phishing attempts is also advisable.
Read Original

Researchers from ReliaQuest have identified a phishing campaign targeting high-profile business executives through LinkedIn messages. The attackers are using an open-source penetration testing tool to craft convincing messages that trick individuals into revealing sensitive information. This campaign is particularly concerning because it targets 'high-value individuals,' making it more likely to succeed against those with access to critical company data. Companies need to educate their employees about recognizing phishing attempts and to implement stronger security measures to protect against these types of attacks. With the rise of social engineering tactics like this, vigilance is essential for safeguarding sensitive business information.

Impact: LinkedIn, Business Executives
Remediation: Companies should train employees to recognize phishing attempts and consider implementing two-factor authentication for LinkedIn accounts.
Read Original

Scammers are targeting LinkedIn users with a new phishing tactic that involves fake comments appearing as replies to legitimate posts. These comments, which resemble official LinkedIn notifications, falsely warn users about policy violations and encourage them to click on malicious external links. Some attackers are even using LinkedIn's own lnkd.in URL shortener, making it more difficult for users to recognize these attempts as scams. This tactic is particularly concerning as it exploits the trust users have in the platform, potentially compromising personal and professional information. LinkedIn users should be cautious and verify the authenticity of comments before clicking on any links.

Impact: LinkedIn users, especially professionals using the platform for networking and job searching.
Remediation: Users should verify the authenticity of comments and links before clicking, report suspicious activity to LinkedIn, and consider adjusting privacy settings to limit exposure.
Read Original

A significant security oversight was uncovered when researchers found an unsecured 16TB MongoDB database that exposed approximately 4.3 billion professional records. This database primarily contained LinkedIn-style data, which could be exploited for large-scale AI-driven social engineering attacks. The discovery was made by Bob Diachenko and nexos.ai on November 23, 2025, and the database was secured only after the researchers alerted its owner. This incident underscores the risks associated with unsecured databases, as the exposed data could facilitate identity theft and phishing schemes targeting professionals. Organizations need to ensure better security measures for their data to prevent such breaches in the future.

Impact: Unsecured MongoDB database, professional records, LinkedIn-style data
Remediation: Database secured after researcher notification; organizations should implement strict access controls and regular security audits.
Read Original