Aggregator
South Shore Regional Emergency Communications Center Hit by Cyber Attack
Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage
LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why it is attractive to sophisticated cyber adversaries, including aggressive nation state actors, who use LinkedIn for nefarious activities such as information gathering, target profiling, human-asset engagement, fraud, social engineering, and trust building.
Urgent and time sensitive messages, especially regarding career opportunities, target cognitive vulnerabilities and are leveraged by attackers to manipulate victims.
Use the tool, but know the dangers and take necessary precautions.
- Don’t share your clearance level or indicators of wealth — this makes you a preferred target
- Don’t share details of confidential work activities, such as project details, coworkers, or plans
- Keep it professional and don’t expose private personal information about yourself, family, or others (ex. wishing someone a happy 25th birthday — gives a fraudster that person’s birthdate!)
- Expect to be contacted by fraudsters and people with malicious intent
- Don’t assign credibility, without verification, to what someone lists on their profile or in in their posts
- Understand there will be some level of fake accounts, impersonations, fictitious company listings, phony job postings, and news misinformation
- Be careful with Direct Messaging (DM), as it can be employed for spam, phishing, distributing dangerous attachments, and sending links to malicious sites
Use critical thinking and common sense — don’t be an easy victim or useful idiot.
Stay updated on cybersecurity trends and risk patterns. If unsure about a situation, ask cybersecurity professionals (we live for this stuff and are also on LinkedIn)!
The post Tips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and Espionage appeared first on Security Boulevard.
CVE-2019-12881 | Linux Kernel 4.15.0 on Ubuntu i915_gem_userptr.c i915_gem_userptr_get_pages IOCTL Call null pointer dereference (Nessus ID 246667 / BID-108873)
CVE-2019-11747 | Mozilla Firefox up to 68.x History HSTS initialization (MFSA 2019-25 / Nessus ID 246668)
CVE-2021-47110 | Linux Kernel up to 5.4.124/5.10.42/5.12.9 kvm machine_shutdown memory corruption (Nessus ID 246670)
CVE-2021-47518 | Linux Kernel up to 5.15.7 nfc null pointer dereference (Nessus ID 246672)
CVE-2024-40955 | Linux Kernel up to 6.6.35/6.9.6 ext4_mb_find_good_group_avg_frag_lists out-of-bounds (677ff4589f15/b829687ae122/13df4d44a3aa / Nessus ID 246673)
CVE-2025-48708 | Artifex Ghostscript up to 10.05.0 base/gslibctx.c gs_lib_ctx_stash_sanitized_arg improper removal of sensitive information before storage or transfer (Nessus ID 237937 / WID-SEC-2025-1134)
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
CVE-2022-1943 | Linux Kernel UDF File System udf_write_fi memory corruption (Nessus ID 246676)
CVE-2023-0180 | NVIDIA GPU Display Driver on Linux out-of-bounds (Nessus ID 246678)
CVE-2020-26967 | Mozilla Firefox up to 82.x Screenshot injection (mfsa2020-50 / Nessus ID 246680)
CVE-2023-3550 | Mediawiki 1.40.0 XML File cross site scripting (Nessus ID 246686)
CVE-2020-35519 | Linux Kernel 5.12-rc5 net/x25/af_x25.c x25_bind out-of-bounds (Nessus ID 246689)
BSidesSF 2025: AI’s Bitter Lesson For SOCs: Let Machines Be Machines
Creators/Authors/Presenters: Jackie Bow, Peter Sanford
Our deep appreciation to Security BSides - San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: AI’s Bitter Lesson For SOCs: Let Machines Be Machines appeared first on Security Boulevard.