Dec 01, 2025 • ESET WeLiveSecurity
Oversharing is not caring: What’s at stake if your employees post too much online
This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage...
Executive Summary
This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage publicly posted work-related information for reconnaissance, enabling targeted phishing campaigns, credential theft, and social engineering attacks. The primary risk stems from operational security failures where employees inadvertently disclose organizational details, technologies, hierarchies, and ongoing projects. Mitigation strategies include implementing social media policies, conducting security awareness training on OPSEC principles, establishing clear guidelines for what information should remain private, and monitoring public-facing employee content. While no specific threat actors or malware are referenced, the article highlights a fundamental reconnaissance vector that enables numerous attack chains.
Summary
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
Published Analysis
This article addresses the risks of employee oversharing on social media platforms like LinkedIn, X (Twitter), GitHub, and Instagram. Attackers can leverage publicly posted work-related information for reconnaissance, enabling targeted phishing campaigns, credential theft, and social engineering attacks. The primary risk stems from operational security failures where employees inadvertently disclose organizational details, technologies, hierarchies, and ongoing projects. Mitigation strategies include implementing social media policies, conducting security awareness training on OPSEC principles, establishing clear guidelines for what information should remain private, and monitoring public-facing employee content. While no specific threat actors or malware are referenced, the article highlights a fundamental reconnaissance vector that enables numerous attack chains. From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble. From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.