[Krebs on Security] How Phishers Are Slinking Their Links Into LinkedIn

Krebs on Security has posted a new item.
If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne’er-do-wells are hoping you will, because they’ve long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin’s parent firm Microsoft).
krebsonsecurity.com/2022/02/how-phishers-are-slinking-their-links-into-linkedin/
Please use the link above to continue reading this posting. * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
Virtual Event: Stop a Ransomware Attack in Action
Join ExtraHop for a live simulation of a modern ransomware attack. Our experts will expose the post compromise attack techniques that are being used by advanced ransomware actors, as seen in real customer environments.
There will be no sales people attending this session. Please join us for an informative conversation about modern ransomware attack techniques, how Reveal(x) 360 detects and stops threats, and come prepared to have your questions answered.
Register today: www.krebsonsecurity.com/extrahop/ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
You received this e-mail because you asked to be notified when new updates are posted.
Best regards,
BrianKrebs krebsonsecurity.com
P.S. You may manage your subscription here: krebsonsecurity.com/subscribe/

Leave a comment

Your email address will not be published. Required fields are marked *