[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@DefusedCyber Avatar @DefusedCyber Defused

Defused posts on X about ip, taiwan semiconductor, taiwan, adc the most. They currently have XXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

Mentions: X #

Mentions Line Chart

Followers: XXXXX #

Followers Line Chart

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence technology brands XX% stocks XX% countries X%

Social topic influence ip 4%, taiwan semiconductor 4%, taiwan 4%, adc 4%, china 4%, sap X%

Top accounts mentioned or mentioned by @octolusnet @simokohonen @karanjagtiani04 @thorscanner @proofpoint @phaldrzynski

Top assets mentioned Taiwan Semiconductor (TSM)

Top Social Posts

Top posts by engagements in the last XX hours

"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS XXX ( VMISS ) IP VirusTotal Detections 0/95 🟢 This actor downloads Turnt a C2C tool with AV Detection Ratio: 🔴 X / XX (see comment by @thor_scanner) Event with payload👇"
X Link 2025-12-06T09:32Z 4755 followers, 10.3K engagements

"Actor exploiting CVE-2025-52970 (FortiWeb Authentication Bypass) from 182.8.97.131 ( PT. Telekomunikasi Selular) VirusTotal Detections: 0/95 🟢 This vulnerability has not yet entered known exploitation by CISA but exploits have hit honeypots since late August"
X Link 2025-10-15T12:32Z 4716 followers, 2580 engagements

"⚠ Small uptick in MS-related exploit activity ongoing (across SharePoint WSUS Exchange) 💡80.85.154.101 was included in a @proofpoint July 2025 report "China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting""
X Link 2025-11-19T12:17Z 4717 followers, 3068 engagements

"Ransomware vulns with highest exploit likelihood (past 30d): - CVE-2024-40766 (SonicOS SSL-VPN.) +64.88% - CVE-2022-27510 (NetScaler ADC.) +21.33% - CVE-2022-27510 (Gateway.) +21.33% - CVE-2021-27877 (Veritas Veritas.) +15.37% - CVE-2021-27876 (Veritas Veritas.) +14.32%"
X Link 2025-12-01T11:14Z 4717 followers, 9801 engagements

"🚨A critical CVE scoe XXXX vuln in React Server (CVE-2025-55182) has just dropped Some reports of ongoing in-the-wild exploitation but no public POC is available Defused TF subscribers can now access the React Server honeypot stream"
X Link 2025-12-03T19:00Z 4718 followers, 18.9K engagements

"We have added detection for the exploit POC released for CVE-2025-55182 into our React Server honeypot 🍯 Our stream alerting logic has been updated and no action is needed from the users"
X Link 2025-12-04T00:20Z 4717 followers, 8361 engagements

"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 56040 (China Mobile communications corporation) This actor is likely part of the China-nexus cyber threat groups as reported by AWS Event with payload Defused TF sub required 👇"
X Link 2025-12-05T15:52Z 4716 followers, 5392 engagements

"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 399629 ( BLNWX ) Actor is using a novel previously undocumented exploit path in their exploit Event with payload Defused TF sub required 👇"
X Link 2025-12-08T20:55Z 4721 followers, 13.6K engagements

"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 16509 ( AMAZON-02 ) Actor is using another previously unseen exploit technique to steal credentials and remove existing malware Event with payload Defused TF sub required 👇"
X Link 2025-12-09T10:26Z 4723 followers, 3591 engagements

"⚠Unknown Fortinet exploit (possibly a CVE-2022-40684 variant) from 64.95.13.8 ( BLNWX ) VirusTotal Detections: 0/95 🟢 JWT payload translates into: "username": "admin" "profname": "prof_admin" "vdom": "root" "loginname": "admin""
X Link 2025-10-06T16:50Z 4742 followers, 99.7K engagements

"⚠ Roughly during the last week we are seeing elevated rates of FortiGate vulnerability enumeration specifically targetting the pathway used in CVE-2022-40684 These are not only hitting Fortinet honeypots but also other honeypot types suggesting widespread fingerprinting"
X Link 2025-12-08T11:18Z 4754 followers, 9367 engagements

"🚨 Critical (CVSS 9.9) RCE vuln in SAP Solution Manager (CVE-2025-42880) allows an authenticated attacker to execute code. We have added it as a honeypot stream into Defused TF. 🍯 This vulnerability does not have a POC yet. Lets go hunting 👉"
X Link 2025-12-11T18:07Z 4754 followers, 6362 engagements