Unit 42 reports a phishing campaign impersonating Palo Alto Networks staff that leverages scraped LinkedIn data to pressure senior professionals into paying fees, while Hackread warns of lookalike domains and fake notifications stealing LinkedIn credentials.
We identified a phishing campaign targeting senior professionals by impersonating Palo Alto Networks staff.
Threat actors leverage scraped LinkedIn data to claim resumes failed system filters then solicit fees for alignment.
a new LinkedIn phishing scam uses fake notifications and lookalike domains to steal credentials, hijack accounts, and access sensitive professional data.
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security