← Back to BrewedIntel
othermediumInformation DisclosureOSINTSocial Engineering

Dec 01, 2025 • ESET WeLiveSecurity

Oversharing is not caring: What’s at stake if your employees post too much online

This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage...

Source
ESET WeLiveSecurity
Category
other
Severity
medium

Executive Summary

This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage publicly posted work-related information for reconnaissance, enabling targeted phishing campaigns, credential theft, and social engineering attacks. The primary risk stems from operational security failures where employees inadvertently disclose organizational details, technologies, hierarchies, and ongoing projects. Mitigation strategies include implementing social media policies, conducting security awareness training on OPSEC principles, establishing clear guidelines for what information should remain private, and monitoring public-facing employee content. While no specific threat actors or malware are referenced, the article highlights a fundamental reconnaissance vector that enables numerous attack chains.

Summary

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.

Published Analysis

This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage publicly posted work-related information for reconnaissance, enabling targeted phishing campaigns, credential theft, and social engineering attacks. The primary risk stems from operational security failures where employees inadvertently disclose organizational details, technologies, hierarchies, and ongoing projects. Mitigation strategies include implementing social media policies, conducting security awareness training on OPSEC principles, establishing clear guidelines for what information should remain private, and monitoring public-facing employee content. While no specific threat actors or malware are referenced, the article highlights a fundamental reconnaissance vector that enables numerous attack chains. From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble. From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.