[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@The_Cyber_News Avatar @The_Cyber_News Cyber Security News

Cyber Security News posts on X about microsoft, ai, microsoft teams, hosted the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

Mentions: XX #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence technology brands stocks social networks countries automotive brands finance

Social topic influence microsoft #888, ai, microsoft teams #20, hosted #1050, cloudflare, ip #724, $googl, docs, citrix systems, gain

Top accounts mentioned or mentioned by @thecybernews @falconfeedsio @cyberwrites @thecybernew @cyberpressorg @expelsecurity @mrfoxesite4482 @the_satyadvv @seoscottsdale @lnxsec @alpharaday @callmikingdav @penguinohgreat

Top assets mentioned Microsoft Corp. (MSFT) Cloudflare, Inc. (NET) Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last XX hours

"🚨 KawaiiGPT Free WormGPT Variant Leveraging DeepSeek Gemini and Kimi-K2 AI Models Source: KawaiiGPT emerges as an accessible open-source tool that mimics the controversial WormGPT providing unrestricted AI assistance via jailbroken large language models. Hosted on GitHub with over XXX stars and XX forks it requires no API keys and installs quickly on Linux or Termux environments. Users can deploy KawaiiGPT in minutes by updating packages installing Python and Git cloning the repository and running simple install and launch scripts. Linux distributions use apt-get commands while Termux users"
X Link 2025-11-28T02:30Z 34.4K followers, 32.4K engagements

"⚠ FortiOS FortiWeb and FortiProxy Vulnerability Lets Attackers Bypass SSO Authentication Source: Fortinet has issued an urgent security advisory regarding a critical vulnerability affecting its FortiOS FortiWeb FortiProxy and FortiSwitchManager product lines. The security flaw identified as an Improper Verification of Cryptographic Signature (CWE-347) could allow an unauthenticated attacker to bypass the FortiCloud Single Sign-On (SSO) login authentication. The vulnerability stems from the devices failure to verify signatures within SAML messages properly. If exploited a threat actor could"
X Link 2025-12-10T02:48Z 34.4K followers, 38.7K engagements

"🚨 Gemini Zero-Click Vulnerability Let Attackers Access Gmail Calendar and Docs Source: A critical zero-click vulnerability dubbed "GeminiJack" in Google Gemini Enterprise and previously Vertex AI Search that let attackers steal sensitive corporate data from Gmail Calendar and Docs with minimal effort. This flaw exploited how AI systems process shared content allowing it to bypass traditional defenses such as data loss prevention (DLP) and endpoint tools. GeminiJack demonstrates the evolving security landscape as AI systems become deeply integrated with organizational data. Stay ahead of"
X Link 2025-12-10T08:45Z 34.4K followers, 11.8K engagements

"🚨 Hackers Actively Exploiting Cisco and Citrix 0-Day in the Wild to Deploy Webshell Read more: An advanced hacking group is actively exploiting zero-day vulnerabilities in Cisco Identity Services Engine (ISE) and Citrix systems. These attacks spotted in real-world operations allow hackers to deploy custom webshells and gain deep access to corporate networks. The attack was uncovered by Amazon's MadPot honeypot service a tool designed to lure and study cyber threats. It caught attempts to exploit a Citrix flaw known as "Citrix Bleed Two" (CVE-2025-5777) before anyone knew about it publicly."
X Link 2025-11-13T01:45Z 34.2K followers, 4792 engagements

"Cybersecurity News Weekly Newsletter Fortinet Chrome 0-Day Flaws Cloudflare Outage and Salesforce Gainsight Breach Read more: #CybersecurityNews"
X Link 2025-11-23T13:57Z 34.2K followers, 2798 engagements

"🚨 Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Source: A significant gap in Microsoft Teams' B2B guest access allows attackers to bypass Defender for Office XXX protections creating unprotected areas for phishing and malware. New cross-tenant chat features enabled by default allow threat actors to lure users into malicious tenants where home organization safeguards do not apply. As Teams plays a central role in enterprise collaboration this risk grows with attackers easily setting up trial tenants that lack Defender enabling undetected delivery of malicious links"
X Link 2025-11-27T05:36Z 34.3K followers, 19.5K engagements

"⚠ Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Source: A threat actor known as "zestix" has claimed responsibility for a significant data breach affecting Mercedes-Benz USA (MBUSA) allegedly exfiltrating XXXX GB of sensitive legal and customer information. The threat actor posted the dataset for sale on a dark web forum pricing the complete archive at $5000. According to the listing the breach exposes a wide array of internal documents spanning active and closed litigation files from XX U.S. states. At the time of this report Mercedes-Benz USA has not issued any"
X Link 2025-12-01T03:04Z 34.3K followers, 6537 engagements

"🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability Source: A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook identified as CVE-2024-21413. Dubbed MonikerLink this flaw allows attackers to bypass Outlooks security mechanisms specifically the Protected View to execute malicious code or steal credentials. The release of this PoC highlights the continued risk posed by this vulnerability and serves as a training tool for security professionals to understand the attack vector."
X Link 2025-12-01T06:21Z 34.3K followers, 41.3K engagements

"πŸ” Windows XX 24H2 Update Hides Password Icon on Lock Screen Source: Microsoft has confirmed a bizarre user interface bug affecting Windows XX version 24H2 devices that renders the password sign-in icon invisible on the lock screen. The issue stemming from the August 2025 non-security preview update (KB5064081) and persisting in subsequent cumulative updates has left many users confused when switching between authentication methods. The glitch impacts users who have configured multiple sign-in options such as a PIN fingerprint or security key alongside their traditional password."
X Link 2025-12-01T10:02Z 34.1K followers, 8714 engagements

"πŸ” Lets Encrypt to Reduce Certificate Validity from XX Days to XX Days Source: Lets Encrypt has officially announced plans to reduce the maximum validity period of its SSL/TLS certificates from XX days to XX days. The transition which will be completed by 2028 aligns with broader industry shifts mandated by the CA/Browser Forum Baseline Requirements. This move is designed to enhance internet security by limiting the window of compromise for stolen credentials and improving the efficiency of certificate revocation technologies. #cybersecuritynews"
X Link 2025-12-03T09:23Z 34.3K followers, 50.2K engagements

"🚨 CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Source: CISA has added two critical Android Framework vulnerabilities to its Known Exploited Vulnerabilities catalog signaling active exploitation in the wild. The vulnerabilities affect the Android OS and pose significant risks to millions of mobile devices worldwide. The two vulnerabilities are CVE-2025-48572 an Android Framework privilege escalation flaw and CVE-2025-48633 an information disclosure vulnerability in the same framework component. #cybersecuritynews #android"
X Link 2025-12-04T06:06Z 34.2K followers, 5434 engagements

"🚨 New SVG Clickjacking Attack Lets Attackers Create Interactive Clickjacking Attacks Source: A sophisticated new technique dubbed SVG clickjacking fundamentally changes the threat landscape. The novel exploitation technique that fundamentally transforms how clickjacking attacks operate turning them from simple hidden button tricks into complex interactive exploits capable of reading screen content and executing logic. This technique leverages Scalable Vector Graphics (SVG) filters to create smart overlays that can detect and respond to the state of a target website. #cybersecuritynews"
X Link 2025-12-04T18:11Z 34.3K followers, 2733 engagements

"⚠ CISA & NSA Warn of BRICKSTORM Malware Attacking VMware ESXi & Windows Machines Source: CISA NSA and the Canadian Centre for Cyber Security issued a joint advisory today warning of a sophisticated new malware campaign orchestrated by Peoples Republic of China (PRC) state-sponsored cyber actors. BRICKSTORM is designed for deep integration into virtualized infrastructure. It specifically targets VMware vCenter servers and ESXi hosts enabling threat actors to directly manipulate virtual machines. The malwares command-and-control (C2) mechanisms are particularly resilient. BRICKSTORM utilizes"
X Link 2025-12-05T02:47Z 34.3K followers, 5325 engagements

"⚠ Splunk Enterprise Vulnerabilities Allow Privilege Escalation Source: A high-severity vulnerability has been disclosed in Splunk affecting its Enterprise and Universal Forwarder products for Windows stemming from incorrect file permissions during installation and upgrades. The vulnerability tracked as CVE-2025-20386 for Splunk Enterprise and CVE-2025-20387 for Universal Forwarder. Allows non-administrator users to access sensitive installation directories and their contents creating a pathway for privilege escalation attacks. The flaw emerges during fresh installations or version upgrades of"
X Link 2025-12-05T19:00Z 34.3K followers, 6249 engagements

"🚨 Hackers Exploiting Microsoft Teams Notifications to Deliver CallBack Phishing Attack Source: A sophisticated phishing campaign that exploits Microsoft Teams notifications to deceive users into calling fraudulent support numbers. The attack demonstrates how legitimate communication platforms can be weaponized to bypass security defenses and email filters. Threat actors are abusing Microsoft Teams to add users to groups with deceptive team names containing fake financial content. These team names impersonate urgent payment issues including counterfeit invoices auto-renewal notices or"
X Link 2025-12-06T04:27Z 34.3K followers, 8496 engagements

"🚨 React2Shell RCE Vulnerability Exploited in the Wild to Execute Malicious Code Source: A critical remote code execution vulnerability tracked as CVE-2025-55182 and dubbed React2Shell is now under active exploitation in the wild. A largely automated exploitation attempt targeting the unsafe deserialization flaw in the React Server Components Flight protocol. The vulnerability enables unauthenticated remote code execution (RCE) affecting React and downstream ecosystems including Next.js prompting urgent calls for immediate patching. #cybersecuritynews"
X Link 2025-12-08T06:08Z 34.2K followers, 2731 engagements

"⚠ Hackers Exploit AWS IAM Eventual Consistency to Establish Persistence Source: A critical persistence technique in AWS Identity and Access Management (IAM) stemming from its eventual consistency model allowing attackers to retain access even after defenders delete compromised access keys. AWS IAM like many distributed systems employs eventual consistency to scale across regions and replicas. Updates to resources such as access keys or policies propagate with a predictable delay of approximately 3-4 seconds as confirmed through OFFENSAI's testing across regions like us-east-1 and"
X Link 2025-12-08T17:05Z 34.3K followers, 4370 engagements

"πŸ’°Proofpoint Acquires Hornetsecurity in $XXX Billion Deal to Strengthen SMB Cybersecurity Source: Proofpoint Inc. a pioneer in human-centric cybersecurity has finalized its $XXX billion acquisition of Hornetsecurity Group a dominant European provider of AI-driven Microsoft XXX security solutions. The deal announced today catapults Proofpoints reach into the SMB market via MSP channels arming smaller organizations with advanced threat protection amid rising AI-targeted attacks. The acquisition aligns with Proofpoints mission to secure the agentic workspace where humans and AI agents"
X Link 2025-12-09T14:41Z 34.3K followers, 3466 engagements

"⚠ Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7000+ IPs Source: In an escalating campaign targeting remote access infrastructure threat actors have initiated active exploitation attempts against Palo Alto Networks' GlobalProtect VPN portals. The scans and exploitation efforts originating from more than 7000 unique IP addresses worldwide raising alarms for organizations relying on the popular VPN solution for secure remote work. The attacks first detected in late November 2025 focus on vulnerabilities in GlobalProtect gateways particularly those exposed on the"
X Link 2025-12-07T05:30Z 34.3K followers, 9294 engagements

"⚠ Microsoft Confirms Windows XX 25H2 UI Features Broken Along With 24H2 Source: Microsoft has officially confirmed a critical issue affecting enterprise and managed environments running Windows XX versions 24H2 and 25H2. The bug first triggered by cumulative updates released in July 2025 causes widespread failures in essential UI components rendering the desktop unusable for many users. According to an updated support document released on December X 2025 the issue stems from a timing failure in the registration of XAML-dependent packages. #cybersecuritynews #windows"
X Link 2025-12-03T17:29Z 34.4K followers, 34.8K engagements

"πŸ”» Cloudflare Outage Traced to Emergency React2Shell Patch Deployment Source: Cloudflare's global network suffered a brief but widespread disruption this morning lasting approximately XX minutes due to an internal change in its Web Application Firewall (WAF) designed to counter a critical vulnerability in React Server Components. Cloudflare's status page confirmed the outage stemmed from modifications to how the WAF parses incoming requests implemented urgently to mitigate CVE-2025-55182 a maximum-severity (CVSS 10.0) remote code execution (RCE) flaw dubbed "React2Shell." #cybersecuritynews"
X Link 2025-12-05T15:44Z 34.4K followers, 4523 engagements

"🚨 LockBit XXX Infrastructure Exposed in New Server IP and Domain Leak Source: LockBit XXX key infrastructure exposed revealing the IP address 205.185.116.233 and the domain karma0.xyz is hosting the ransomware group's latest leak site. Hosted under AS53667 (PONYNET operated by FranTech Solutions) a network frequently abused for illicit activities the server displays a DDoS protection page branded with "LOCKBITS.5.0" confirming its role in the group's operations. This operational security lapse arrives amid LockBit's resurgence with enhanced malware capabilities. #cybersecuritynews"
X Link 2025-12-07T09:32Z 34.4K followers, 17.7K engagements

"🚨 Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Source: The cybercriminal landscape has recently witnessed the aggressive rise of "Shanya" a potent packer-as-a-service and EDR killer now fueling major ransomware operations. Shanya effectively bridges the critical gap between initial access and final payload deployment offering attackers a specialized toolkit designed specifically to blind security monitors and guarantee successful encryption. Shanya operates through sophisticated DLL side-loading techniques often compromising legitimate system binaries such"
X Link 2025-12-08T09:34Z 34.4K followers, 10.1K engagements

"βœ… AI-Powered Free Security-Audit Checklist 2026 Download: Audit preparation in 2025 still feels like 2005: Excel lists scattered evidence copy & paste from old answers long coordination loops. At the same time requirements are increasing ISO 27001:2022 SOC X NIST CSF NIS X GDPR supplier audits and customer inquiries. And this is precisely where AI-driven approaches come in when used correctly: not as a magical audit machine but as a tool that frees security teams from mindless busywork. Read more: #cybersecuritynews"
X Link 2025-12-09T10:08Z 34.4K followers, 3664 engagements

"🚨 Hackers Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Source: Hackers are leveraging the trust users place in AI platforms like ChatGPT and Grok to distribute the Atomic macOS Stealer (AMOS). A new campaign reveals that attackers have moved beyond mimicking trusted brands to actively utilizing legitimate AI services to host malicious payloads. The infection chain begins with a routine Google search. Users querying common troubleshooting phrases such as "Clear disk space on macOS" are presented with high-ranking results that appear to be helpful guides hosted on legitimate"
X Link 2025-12-10T12:42Z 34.4K followers, 31.5K engagements

"⚠ FortiSandbox OS Command Injection Vulnerability allows attackers to execute Malicious Code Source: Fortinet has released a critical security update for its FortiSandbox analysis appliances to fix a dangerous vulnerability. If left unpatched this flaw could allow attackers to take control of the underlying system. The vulnerability tracked as CVE-2025-53949 was officially published on December X 2025. This specific issue affects the Graphic User Interface (GUI) component of FortiSandbox. Because of this error an attacker with system access (an authenticated attacker) could send specially"
X Link 2025-12-10T17:34Z 34.4K followers, 4287 engagements

"🚨 Notepad++ Vulnerability Let Attackers Hijack Network Traffic to Install Malware via Updates Source: The popular text editor Notepad++ has addressed a severe security weakness in its update mechanism that could allow attackers to hijack network traffic and push malicious executables to users under the guise of legitimate updates. Security researchers recently observed suspicious traffic patterns involving WinGUp the built-in updater used by Notepad++. According to their findings update requests were in some cases being redirected to malicious servers. Instead of retrieving genuine Notepad++"
X Link 2025-12-11T16:01Z 34.4K followers, 30.9K engagements

"πŸ›‘ Microsoft Teams to Launch External Domains Anomalies Report for Improved Security Source: Microsoft plans to enhance the administrative features of its Teams collaboration platform with a significant new security function to monitor external communications. Scheduled for rollout in February 2026 the External Domains Anomalies Report is designed to help IT administrators proactively identify and manage potential risks associated with cross-organizational interactions. This development comes as organizations increasingly rely on seamless external collaboration raising the stakes for data"
X Link 2025-12-12T08:36Z 34.4K followers, 2681 engagements