Hackers love it when you post pictures of your work environment

Hackers love it when you post pictures of your work environment! We are all proud of what we are doing and proud of the great companies we are working in. But by taking pictures of your work environment for LinkedIn or your career blog you are unintentionally disclosing information about your technical setup. This is not a critical vulnerability by itself but can be used by adversaries to prepare for further attacks or to create a well-designed pretext for social engineering.


Just by having a look at your LinkedIn posts and career blogs, attackers can gain a lot of information, like:

  • Operating systems,
  • Used software,
  • Appointments,
  • Email text,
  • Sticky notes on monitors,
  • User names,
  • Departments,
  • Remote connection names,
  • Infrastructure,
  • Badges.

Be careful next time you are posting pictures and blur everything that should not be disclosed. Easy way to waste a hacker’s time, open a full-screen screenshot of a random desktop from Google Image Search, before you take a photo.

The core function of a SOC: Blog Post
Play ransomware infection routine: Blog Post
Identify a piece of malware with Yara: Blog Post
New Veeam v12 Platform Overview: Blog Post
OpenSSL patch (v3.0.7) for Vulnerability 2022: Blog Post
Building a SOC: Blog Post
List of vendors and software affected by the OpenSSL vulnerability: Blog Post
Critical OpenSSL Vulnerability version 3.0: Blog Post
Veeam v12 Linux Without SSH And SUDO: Blog PostHardened Repository in Veeam v12: Blog Post
Wasabi Object Storage Usage with Veeam B&R v12: Blog Post
VeeaMover in v12: Blog Post
Ransomware & Cybersecurity with Veeam v12: Blog Post
Why backup directly to Object Storage? Blog Post
Veeam B&R v12 New Features Overview: Blog Post
[REPLAY] Webinar Veeam v12 and Wasabi: Replay
Protect your data with Veeam and Wasabi: Blog post
Wasabi – Object Lock feature spotlight: Blog post
Veeam and the S3-compatible object storage solutions: Blog Post
[PODCAST] VeeamUser Group France #1: Record
Conti initiates their attacks on Backup: Blog Post
Backup with Trusted Repository Storage: Blog Post.
Protect your Backup against Ransomware: Blog Post

Please follow and like us:

Enjoy this blog? Please spread the word :)