[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@DefusedCyber Avatar @DefusedCyber Defused

Defused posts on X about vt, ip, applied, microsoft the most. They currently have XXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.

Engagements: XXX #

Engagements Line Chart

Mentions: XX #

Mentions Line Chart

Followers: XXX #

Followers Line Chart

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence stocks technology brands countries

Social topic influence vt, ip, applied, microsoft, indonesia

Top assets mentioned Microsoft Corp. (MSFT)

Top Social Posts #


Top posts by engagements in the last XX hours

"If you're trying to figure out active exploit against those SharePoint / ToolShell vulns (CVE-2025-49706 + CVE-2025-49704) we released a free SharePoint decoy template on Defused. It flags a high severity alert automatically if an adverasary tries to leverage the vuln"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-20 15:55:50 UTC XXX followers, 2899 engagements

"Exploitation of ToolShell vulnerability (CVE-2025-53770) 182.2.79.164 AS 23693 ( PT. Telekomunikasi Selular ) 0/94 Detections on VT"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-22 12:07:13 UTC XXX followers, XXX engagements

"Active Mass Exploitation of ToolShell (CVE-2025-53770) 45.191.66.77 AS 269670 ( VIACLIP INTERNET E TELECOMUNICACOES LTDA) X detections on VT"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-21 15:02:48 UTC XXX followers, 5369 engagements

"Active Mass Exploitation of ToolShell (CVE-2025-53770) 45.141.56.114 AS 213373 ( IP Connect Inc ) 2/94 Detections on VT"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-22 07:04:05 UTC XXX followers, 2933 engagements

"Active mass exploitation of the SharePoint vulnerability CVE-2025-53770 in now ongoing according to our honeypot sensors. To our knowledge Microsoft has released the patch for this vulnerability so it should be very hastily applied"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-21 14:35:58 UTC XXX followers, 1899 engagements

"Exploitation of ToolShell Vulnerability (SharePoint CVE-2025-53770) 36.68.9.91 AS 7713 ( PT Telekomunikasi Indonesia ) 0/94 Detections on VT"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-22 16:12:48 UTC XXX followers, XXX engagements

"Mass exploitation of ToolShell vulnerability (CVE-2025-53770) 45.87.213.227 AS 9009 ( M247 Europe SRL )"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-22 12:09:34 UTC XXX followers, XXX engagements

"Likely botnet mass exploiting CVE-2024-4577 (PHP Vulnerability) 146.185.182.65 AS 14061 ( DIGITALOCEAN-ASN )"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-24 13:45:23 UTC XXX followers, XXX engagements

"Ransomware vulns with highest exploit likelihood (past 30d): - CVE-2025-53770 (SharePoint.) +3700.00% - CVE-2019-6693 (FortiOS.) +159.30% - CVE-2019-5591 (FortiOS.) +44.14% - CVE-2024-42057 (Zyxel Firewall.) +33.61% - CVE-2018-13374 (FortiOS.) +30.01%"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-23 05:41:51 UTC XXX followers, 1316 engagements

"Active Mass Exploitation of ToolShell (CVE-2025-53770) 146.70.165.94 AS 9009 ( M247 Europe SRL ) 1/94 detections on VT"
@DefusedCyber Avatar @DefusedCyber on X 2025-07-22 04:44:31 UTC XXX followers, 1882 engagements