#targeted-linkedin-scams

[ follow ]
#phishing
Information security
fromTechzine Global
4 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
2 days ago

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A phishing campaign targets Spanish-speaking users in Latin America and Europe, delivering banking trojans via malware called Horabot.
Information security
fromThe Hacker News
2 days ago

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

A phishing campaign impersonating CERT-UA distributed malware called AGEWHEEZE targeting various organizations in Ukraine.
Information security
fromSecuritymagazine
3 days ago

Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves

Phishing attacks during tax season have become more sophisticated, leveraging generative AI to impersonate trusted entities like the IRS.
Information security
fromTechzine Global
4 days ago

Major phishing campaign on GitHub using fake security alerts

A large-scale phishing campaign targets developers on GitHub, exploiting Discussions to spread fake security alerts about Visual Studio Code and distribute malware.
Information security
fromThe Hacker News
1 week ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Marketing
fromEntrepreneur
7 hours ago

How to Navigate Brand Authenticity in the Age of AI Slop

Originality and authenticity in content are essential for brands to stand out in a saturated market dominated by low-quality AI-generated content.
Information security
fromSecurityWeek
9 hours ago

React2Shell Exploited in Large-Scale Credential Harvesting Campaign

Threat actor exploits Next.js vulnerabilities to exfiltrate credentials and compromise systems at scale, affecting over 766 systems and collecting more than 10,000 files.
Marketing tech
fromExchangewire
12 hours ago

The Stack: AI Surges while Social Platforms Face Scrutiny

AI is growing rapidly, streaming models are evolving, and regulatory pressures on platforms are increasing globally.
Parenting
fromSlate Magazine
9 hours ago

My Mom Got a Call That I Was in a Horrific Accident. What She Did Next Can't Be Undone.

Scammers exploit emotional vulnerabilities, making it crucial to educate and protect against future scams.
#meta
Tech industry
fromwww.npr.org
23 hours ago

What's next for Meta in the wake of trial losses and layoffs?

Meta faces significant challenges with legal rulings and a shift in focus from the Metaverse to artificial intelligence.
Tech industry
fromwww.npr.org
23 hours ago

What's next for Meta in the wake of trial losses and layoffs?

Meta faces significant challenges with legal rulings and a shift in focus from the Metaverse to artificial intelligence.
Law
fromTechCrunch
3 days ago

Meta was finally held accountable for harming teens. Now what? | TechCrunch

Meta has been held liable for endangering child safety and designing addictive apps, leading to significant legal consequences.
#data-breach
Privacy professionals
fromSilicon Canals
9 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy technologies
fromTechCrunch
1 day ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Information security
fromSecuritymagazine
20 hours ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromTechCrunch
23 hours ago

Telehealth giant Hims & Hers says its customer support system was hacked | TechCrunch

Hims & Hers confirmed a data breach affecting customer support data, including names and contact information, but not medical records.
Information security
fromTheregister
1 day ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
9 hours ago

A fintech app asked users for their passports - then left 360,000 files unprotected for five years - Silicon Canals

A money transfer app exposed over 360,000 sensitive files on a public server for nearly five years, including unencrypted personal documents.
Privacy technologies
fromTechCrunch
1 day ago

Exclusive: Money transfer app Duc exposed thousands of driver's licenses and passports to the open web

A publicly accessible Amazon storage server exposed personal data of hundreds of thousands, including driver's licenses and passports, without encryption.
Information security
fromSecuritymagazine
20 hours ago

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

Mercor, an AI startup, experienced a data breach involving 4 terabytes of stolen data linked to a supply chain attack by hacking groups.
Privacy professionals
fromTechCrunch
23 hours ago

Telehealth giant Hims & Hers says its customer support system was hacked | TechCrunch

Hims & Hers confirmed a data breach affecting customer support data, including names and contact information, but not medical records.
Information security
fromTheregister
1 day ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
DevOps
fromInfoWorld
11 hours ago

Understanding the risks of OpenClaw

OpenClaw is an orchestration layer that requires external services to function effectively, rather than being a standalone cloud platform.
#linkedin
Online marketing
fromNeil Patel
4 days ago

How to Boost a Post on LinkedIn: Tips for Better Reach

Boost successful LinkedIn posts with social proof to enhance visibility and engagement, rather than attempting to fix weak content with paid spend.
Social media marketing
fromInc
5 days ago

6 Simple LinkedIn Engagement Strategies When You Don't Know What to Post

Consistent engagement on LinkedIn is crucial for building relationships and brand awareness, even with minimal effort.
Online marketing
fromNeil Patel
4 days ago

How to Boost a Post on LinkedIn: Tips for Better Reach

Boost successful LinkedIn posts with social proof to enhance visibility and engagement, rather than attempting to fix weak content with paid spend.
Social media marketing
fromInc
5 days ago

6 Simple LinkedIn Engagement Strategies When You Don't Know What to Post

Consistent engagement on LinkedIn is crucial for building relationships and brand awareness, even with minimal effort.
Careers
fromEntrepreneur
1 day ago

Job Seekers Are Getting Ghosted in Record Numbers. One Person Got a Rejection Letter 11 Months After Applying.

Job seekers face increased ghosting, with 53% affected, largely due to AI-driven application processes overwhelming recruiters.
#ai
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Marketing tech
fromHR Brew
19 hours ago

AI is changing how people look for jobs, forcing recruiters to keep up

AI is transforming SEO and recruitment strategies, requiring adaptation to new search behaviors and tools.
Careers
fromwww.businessinsider.com
2 days ago

The career ladder is fading as AI reshapes work, LinkedIn exec says

AI is reshaping careers, leading to nonlinear paths where workers have more control over their career trajectories.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Marketing tech
fromHR Brew
19 hours ago

AI is changing how people look for jobs, forcing recruiters to keep up

AI is transforming SEO and recruitment strategies, requiring adaptation to new search behaviors and tools.
Careers
fromwww.businessinsider.com
2 days ago

The career ladder is fading as AI reshapes work, LinkedIn exec says

AI is reshaping careers, leading to nonlinear paths where workers have more control over their career trajectories.
Growth hacking
fromSilicon Canals
22 hours ago

The people who look most successful on the outside often have no idea what they're doing - they just learned early that confidence and competence look identical from a distance - Silicon Canals

The gap between perceived success and actual competence is significant, often leading to overconfidence in those with limited knowledge.
fromwww.theguardian.com
1 day ago

Tinder for Nazis' and the woman who hacked it - podcast

Martha Root, in disguise, hacked into WhiteDate, revealing a vast network of neo-Nazis who were actively seeking relationships based on their extremist beliefs.
NYC LGBT
SF parents
fromBoston.com
2 days ago

Mass. man sentenced for online threats to public figures, children, elementary school

A Wilbraham man was sentenced to 32 months in prison for making violent threats against public officials, children, and a local school.
SF politics
fromLos Angeles Times
2 days ago

Contributor: Investigate the AI campaigns flooding public agencies with fake comments

Artificial intelligence is being exploited to create fake grassroots opposition against clean air regulations, undermining public health initiatives.
Digital life
fromBig Think
3 days ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
NYC politics
fromHoodline
3 days ago

Brooklyn Drivers Slammed With Scam 'Enforcement Action' Texts, NYPD Warns

Brooklyn drivers are targeted by a scam text claiming enforcement action, urging immediate payment to avoid penalties.
Psychology
fromPsychology Today
3 days ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
Marketing tech
fromTechCrunch
6 hours ago

The Facebook insider building content moderation for the AI era | TechCrunch

Brett Levenson advocates for 'policy as code' to improve content moderation at Facebook, addressing deeper issues beyond technology.
#cybersecurity
Information security
fromComputerWeekly.com
1 day ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
EU data protection
fromTechCrunch
5 hours ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
2 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromComputerWeekly.com
1 day ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
EU data protection
fromTechCrunch
5 hours ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
2 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Deliverability
fromwww.theguardian.com
1 day ago

Goodbye mrbrightside416: Google allows users to alter quirky Gmail addresses

Google allows US users to change their Gmail username once every 12 months without losing access to their account.
Careers
fromZDNET
4 days ago

3 red flags that job posting is a scam - and how to verify safely

Job scams are on the rise, exploiting vulnerable job seekers with vague offers and promises of high pay for little work.
Social media marketing
fromBGR
2 days ago

Instagram Finally Found A Premium Feature You Might Want - And It's A Little Creepy - BGR

Instagram is a major revenue source for Meta, generating $71 billion by 2025, and is testing a subscription service with new features.
Online marketing
fromMakeUseOf
2 days ago

No, it's not your microphone - this is how advertisers know what you want

Advertisers use data from your online behavior, not microphone recordings, to deliver targeted ads accurately.
Cryptocurrency
fromCointelegraph
1 week ago

How a 'Wrong Number' Message Turned Into a $3.4M Crypto Scam

This $3.4 million scam illustrates the rise of social engineering in crypto fraud, focusing on emotional manipulation over technical exploits.
#social-media
Digital life
fromExchangewire
3 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
Privacy technologies
fromFox News
1 week ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
Digital life
fromExchangewire
3 days ago

Regulating Social Media: Where do we go from here?

Social media platforms are designed for addiction, prompting global legislative actions to restrict children's access.
Privacy technologies
fromFox News
1 week ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
Privacy professionals
fromThe Verge
1 day ago

Pinterest said he violated laid-off colleagues' privacy. Now he's going public

A former Pinterest engineer claims he was unjustly fired for sharing a tool that revealed employee layoffs.
Social media marketing
fromForbes
1 day ago

7 Ways Entrepreneurs Can Build Trust In Their Personal Brands

Trust is crucial for building a personal brand online, as many consumers are skeptical of social media information.
Digital life
fromDigiday
3 days ago

In graphic detail: The long road to accountability for social media platforms

Big tech giants are now held accountable for harming children, marking a significant shift in social media regulation.
Privacy professionals
fromZDNET
21 hours ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
fromFingerlakes1.com
3 weeks ago

Report: NYS among worst states for online, social media scams | Fingerlakes1.com

They have to have a real name or organization. They have to have a physical address. There has to be a phone number. There has to be some type of tax ID or other type of financial identification so you know exactly who you're dealing with.
US news
Information security
fromSecurityWeek
9 hours ago

Mobile Attack Surface Expands as Enterprises Lose Control

Mobile device security is inadequate, with many organizations using critically outdated operating systems and exposing sensitive data to potential attacks.
#whatsapp
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy professionals
fromTNW | Apple
1 day ago

WhatsApp notifies 200 users who installed fake app built by Italian spyware maker SIO

WhatsApp alerted 200 users in Italy about a counterfeit app that was actually government spyware developed by SIO.
Information security
fromTheregister
2 days ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy professionals
fromTNW | Apple
1 day ago

WhatsApp notifies 200 users who installed fake app built by Italian spyware maker SIO

WhatsApp alerted 200 users in Italy about a counterfeit app that was actually government spyware developed by SIO.
Information security
fromTheregister
2 days ago

Don't open that WhatsApp message, Microsoft warns

WhatsApp messages are being exploited to deliver malicious files that allow attackers to control victims' machines and access their data.
Information security
fromFortune
1 day ago

I knew about North Korean hackers-they still tricked me and got into my computer | Fortune

North Korean hackers are increasingly targeting individuals in the crypto industry, employing sophisticated deception tactics.
Privacy technologies
fromForbes
2 weeks ago

Meta, Social Media Scams, A $16 Billion Crisis: What You Need To Know

Americans lost over $16 billion to scams in 2024, a 33% increase from 2023, with nearly half of fraud losses originating from social media platforms where Meta profits from scam advertising.
Privacy professionals
fromHer Campus
3 days ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
Online marketing
fromZDNET
3 weeks ago

Watch this, get rich, lose it all - 8 ways to spot and avoid investment scams on Meta

A Russian-speaking cybercriminal network operates 300+ malvertising campaigns across 25 countries using fake Meta ads impersonating trusted media brands and celebrities to lure victims into investment scams.
#meta-fraud-prevention
fromTechRepublic
3 weeks ago

Meta Rolls Out New Scam Alerts Across Facebook, WhatsApp, and Messenger

Scammers are constantly evolving their tactics - and so are we. Every day, criminals use increasingly sophisticated measures to defraud people on our platforms and across the internet.
Privacy technologies
Privacy technologies
fromwww.socialmediatoday.com
3 weeks ago

Meta adds new scam protections to Facebook, WhatsApp and Messenger

Meta introduced scam prevention features across Facebook, WhatsApp, and Messenger, and collaborated with law enforcement to arrest 21 scammers during a joint disruption operation.
Social media marketing
fromMashable
3 weeks ago

Meta rolls out scam warnings on Facebook, Messenger, WhatsApp

Meta deployed AI-powered fraud detection tools and law enforcement partnerships to combat scams, removing 159 million scam ads and 10.9 million criminal accounts in 2025.
Privacy technologies
fromwww.socialmediatoday.com
3 weeks ago

Meta outlines improved scam protection in Messenger app

Meta's Safe Browsing feature in Messenger protects users from malicious links in DMs using on-device models and an expanded Advanced Browsing Protection with a watchlist of millions of potentially dangerous websites.
Information security
fromSecurityWeek
3 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
#scam-detection
Social media marketing
fromEngadget
3 weeks ago

Meta rolls out new features for scam protection

Meta launches AI-powered scam detection tools, suspicious activity alerts across platforms, and expands advertiser verification to combat fraud and impersonation schemes.
Social media marketing
fromEngadget
3 weeks ago

Meta rolls out new features for scam protection

Meta launches AI-powered scam detection tools, suspicious activity alerts across platforms, and expands advertiser verification to combat fraud and impersonation schemes.
#cybercrime
Privacy professionals
fromthenextweb.com
4 weeks ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromthenextweb.com
4 weeks ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromSecurityWeek
3 weeks ago

Meta Launches New Protection Tools as It Helps Disrupt Scam Centers

Meta disrupted Southeast Asian scam centers targeting US, UK, and APAC users by shutting down 150,000 accounts and removing 159 million fraudulent ads in 2025.
Information security
fromSecurityWeek
6 days ago

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

macOS users are targeted by a ClickFix campaign delivering a Python-based information stealer through a fake Cloudflare verification page.
E-Commerce
fromPractical Ecommerce
2 months ago

The Fraud Hiding in Email Signups

Fake but valid email accounts enable card testing and coupon abuse, causing chargebacks, revenue and inventory loss, and jeopardizing merchant payment relationships.
Information security
fromTechzine Global
2 weeks ago

Identity has become malleable for cyber attackers

Modern cyberattacks combine psychological manipulation, deepfakes, voice phishing, and stolen data to breach even well-defended organizations without exploiting software vulnerabilities.
Information security
fromSecurityWeek
2 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Information security
fromMail Online
2 weeks ago

Urgent warning to all Gmail users over scam using security checks

A sophisticated scam mimics Google's security tool to steal Gmail credentials and device data through fake verification prompts and malicious PWA installation.
Information security
fromSecurityWeek
3 weeks ago

The Human IOC: Why Security Professionals Struggle with Social Vetting

Security teams must apply the same rigorous vetting standards to people and organizations as they do to security information to avoid reputational damage and poor decision-making.
fromhttps://www.wbrc.com
1 month ago

Woman loses Facebook business account to person posing as social media influencer

"The buttons that he's telling me to push are not there. I don't use Zoom often so I'm feeling frustrated thinking that I don't know what I'm doing. He's getting frustrated, and he says, 'OK, let's just switch the Zoom call to your phone,'" Stotts said.
Privacy professionals
fromPCWorld
4 weeks ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
#malvertising
fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

fromMashable
1 month ago
Information security

Hackers use this tool to bypass fraud detection and weaponize Google ads

Information security
fromSecuritymagazine
2 months ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
Information security
fromTechzine Global
2 months ago

Number of phishing attacks doubles in one year

Phishing kits and phishing-as-a-service expanded in 2025, enabling less skilled attackers and leveraging AI-generated messages and QR-based quishing to increase realism and bypass defenses.
Information security
fromArs Technica
2 months ago

There's a rash of scam spam coming from a real Microsoft address

The legitimate Microsoft Power BI address no-reply-powerbi@microsoft.com is being abused to send scam emails that prompt victims to call numbers and install remote-access software.
Information security
fromSecurityWeek
1 month ago

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign

Over 150 coordinated cloned law-firm websites impersonate firms to re-victimize fraud victims by offering free asset recovery and evading takedowns.
[ Load more ]