This still works.
The site:linkedin.com is a common trick in pentesting. You can get the
companyâs email address format (firstname.lastname@, flastname@,
lastnamef@, etc) by looking at the address of whoever is emailing you to
arrange the test. Then given a list of employees from LinkedIn, you can
make a big list of addresses for social engineering attacks.