[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@DefusedCyber DefusedDefused posts on X about ip, taiwan semiconductor, taiwan, adc the most. They currently have XXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence technology brands XX% stocks XX% countries X%
Social topic influence ip 4%, taiwan semiconductor 4%, taiwan 4%, adc 4%, china 4%, sap X%
Top accounts mentioned or mentioned by @octolusnet @simokohonen @karanjagtiani04 @thorscanner @proofpoint @phaldrzynski
Top assets mentioned Taiwan Semiconductor (TSM)
Top posts by engagements in the last XX hours
"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS XXX ( VMISS ) IP VirusTotal Detections 0/95 🟢 This actor downloads Turnt a C2C tool with AV Detection Ratio: 🔴 X / XX (see comment by @thor_scanner) Event with payload👇"
X Link 2025-12-06T09:32Z 4755 followers, 10.3K engagements
"Actor exploiting CVE-2025-52970 (FortiWeb Authentication Bypass) from 182.8.97.131 ( PT. Telekomunikasi Selular) VirusTotal Detections: 0/95 🟢 This vulnerability has not yet entered known exploitation by CISA but exploits have hit honeypots since late August"
X Link 2025-10-15T12:32Z 4716 followers, 2580 engagements
"⚠ Small uptick in MS-related exploit activity ongoing (across SharePoint WSUS Exchange) 💡80.85.154.101 was included in a @proofpoint July 2025 report "China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting""
X Link 2025-11-19T12:17Z 4717 followers, 3068 engagements
"Ransomware vulns with highest exploit likelihood (past 30d): - CVE-2024-40766 (SonicOS SSL-VPN.) +64.88% - CVE-2022-27510 (NetScaler ADC.) +21.33% - CVE-2022-27510 (Gateway.) +21.33% - CVE-2021-27877 (Veritas Veritas.) +15.37% - CVE-2021-27876 (Veritas Veritas.) +14.32%"
X Link 2025-12-01T11:14Z 4717 followers, 9801 engagements
"🚨A critical CVE scoe XXXX vuln in React Server (CVE-2025-55182) has just dropped Some reports of ongoing in-the-wild exploitation but no public POC is available Defused TF subscribers can now access the React Server honeypot stream"
X Link 2025-12-03T19:00Z 4718 followers, 18.9K engagements
"We have added detection for the exploit POC released for CVE-2025-55182 into our React Server honeypot 🍯 Our stream alerting logic has been updated and no action is needed from the users"
X Link 2025-12-04T00:20Z 4717 followers, 8361 engagements
"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 56040 (China Mobile communications corporation) This actor is likely part of the China-nexus cyber threat groups as reported by AWS Event with payload Defused TF sub required 👇"
X Link 2025-12-05T15:52Z 4716 followers, 5392 engagements
"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 399629 ( BLNWX ) Actor is using a novel previously undocumented exploit path in their exploit Event with payload Defused TF sub required 👇"
X Link 2025-12-08T20:55Z 4721 followers, 13.6K engagements
"Actor exploiting CVE-2025-55182 (React Remote Code Execution) from AS 16509 ( AMAZON-02 ) Actor is using another previously unseen exploit technique to steal credentials and remove existing malware Event with payload Defused TF sub required 👇"
X Link 2025-12-09T10:26Z 4723 followers, 3591 engagements
"⚠Unknown Fortinet exploit (possibly a CVE-2022-40684 variant) from 64.95.13.8 ( BLNWX ) VirusTotal Detections: 0/95 🟢 JWT payload translates into: "username": "admin" "profname": "prof_admin" "vdom": "root" "loginname": "admin""
X Link 2025-10-06T16:50Z 4742 followers, 99.7K engagements
"⚠ Roughly during the last week we are seeing elevated rates of FortiGate vulnerability enumeration specifically targetting the pathway used in CVE-2022-40684 These are not only hitting Fortinet honeypots but also other honeypot types suggesting widespread fingerprinting"
X Link 2025-12-08T11:18Z 4754 followers, 9367 engagements
"🚨 Critical (CVSS 9.9) RCE vuln in SAP Solution Manager (CVE-2025-42880) allows an authenticated attacker to execute code. We have added it as a honeypot stream into Defused TF. 🍯 This vulnerability does not have a POC yet. Lets go hunting 👉"
X Link 2025-12-11T18:07Z 4754 followers, 6362 engagements