Hackers hijack LinkedIn comments to spread malware

Experts have warned that phishing attacks are now appearing in LinkedIn comments. Hackers are exploiting the platform's comment sections to distribute malware. Users are advised to stay vigilant against suspicious links in these interactions.

In a concerning development for social media security, hackers have begun hijacking comments on LinkedIn to propagate malware. According to a report from TechRadar, published on January 14, 2026, this tactic involves phishing schemes embedded within the professional networking site's discussion threads.

The article highlights how cybercriminals are leveraging the trust users place in LinkedIn interactions to trick individuals into clicking malicious links. While specific details on the malware's nature or affected users remain undisclosed in the available information, the warning underscores the evolving risks on professional platforms.

Experts emphasize the importance of scrutinizing any unsolicited links or attachments in comments, particularly those urging immediate action or offering dubious opportunities. This incident serves as a reminder that even established networks like LinkedIn are not immune to sophisticated cyber threats.

As phishing evolves to infiltrate comment sections, users and organizations are encouraged to enhance their cybersecurity practices, including regular software updates and awareness training.

Makala yanayohusiana

Illustration depicting VoidLink Linux malware infiltrating cloud infrastructures, as discovered by Check Point researchers.
Picha iliyoundwa na AI

Check Point discovers advanced VoidLink Linux malware for clouds

Imeripotiwa na AI Picha iliyoundwa na AI

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Cybersecurity experts warn that hackers are leveraging large language models (LLMs) to create sophisticated phishing attacks. These AI tools enable the generation of phishing pages on the spot, potentially making scams more dynamic and harder to detect. The trend highlights evolving threats in digital security.

Imeripotiwa na AI

Hackers are targeting WhatsApp users with a new GhostPairing scam that allows full account access without cracking passwords or encryption safeguards. The scam bypasses traditional authentication methods, posing a significant risk to user privacy and security. Users are advised to check the Linked Devices section to detect any compromises.

Emails of US congressional staff have been hacked as part of the Salt Typhoon campaign attributed to Chinese hackers. The incident marks another appearance by these notorious actors in targeting sensitive communications. The breach was reported on January 8, 2026.

Imeripotiwa na AI

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Imeripotiwa na AI

Two individuals connected to China's Salt Typhoon hacking group reportedly underwent training at Cisco's networking academy. This revelation highlights potential vulnerabilities in global cybersecurity education programs. Separately, US lawmakers warn of inadequate safeguards in expanded wiretap authorities.

Jumatano, 28. Mwezi wa kwanza 2026, 18:45:57

LinkedIn introduces AI coding skill assessments for profiles

Jumapili, 25. Mwezi wa kwanza 2026, 16:39:12

Nigerian businesses urged to prioritise staff training as phishing threats escalate

Jumapili, 25. Mwezi wa kwanza 2026, 15:11:38

OpenAI users targeted by scam emails and vishing calls

Jumamosi, 24. Mwezi wa kwanza 2026, 06:44:08

Experts highlight AI threats like deepfakes and dark LLMs in cybercrime

Ijumaa, 23. Mwezi wa kwanza 2026, 02:03:13

Huge data leak exposes 149 million credentials without protection

Jumatano, 21. Mwezi wa kwanza 2026, 17:17:18

Attackers hijack Linux Snap Store apps to steal crypto phrases

Jumatano, 21. Mwezi wa kwanza 2026, 05:18:40

AI-assisted VoidLink malware framework targets Linux cloud servers

Jumapili, 4. Mwezi wa kwanza 2026, 03:38:05

GhostPairing: WhatsApp Hijacking Threat

Ijumaa, 19. Mwezi wa kumi na mbili 2025, 11:19:21

Cisco email security products targeted in zero-day campaign

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa