[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@Threatlabz Zscaler ThreatLabzZscaler ThreatLabz posts on X about $zs, microsoft, $googl, telegram the most. They currently have XXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.
Social category influence stocks technology brands social networks
Social topic influence $zs #8, microsoft, $googl, telegram
Top accounts mentioned or mentioned by @malwrhunterteam @0xrrat94553 @1rthr3athunt3r @rivitna2 @googleplay @k0ng0x86
Top assets mentioned Zscaler Inc (ZS) Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)
Top posts by engagements in the last XX hours
"Zscaler ThreatLabz has discovered CVE-2025-50165 in the Microsoft Windows Graphics Component. With a CVSS score of XXX this vulnerability enables attackers to execute arbitrary code using a specially crafted JPEG image that can be triggered by any application that leverages the Windows Graphics library such as Microsoft Office documents. It is critical that Windows users update applications and install the patched versions in a timely manner. Read the full analysis here:"
X Link 2025-11-20T15:48Z 7928 followers, 74.3K engagements
"⚠ThreatLabz has identified another malicious Android app in the Google Play Store that is still currently live with over 50K downloads. The app is disguised as a document reader / file manager but actually downloads the Anatsa trojan. The IOCs below can be used to identify this Anatsa malware campaign. Anatsa installer MD5: 98af36a2ef0b8f87076d1ff2f7dc9585 Anatsa payload MD5: da5e24b1a97faeacf7fb97dbb3a585af Anatsa download URL: https://quantumfilebreak.com/txt.txt Anatsa C2s: http: //185.215.113.108:85/api/ http: //193.24.123.18:85/api/ http: //162.252.173.37:85/api/ URL of the malicious app"
X Link 2025-12-08T16:49Z 7928 followers, 6042 engagements
"Zscaler ThreatLabz has published a technical analysis of Matanbuchus version XXX and has observed recent deployments consistent with hands-on-keyboard ransomware operations. This new version of Matanbuchus implements a number of obfuscation techniques to evade detection such as junk code encrypted strings and resolving Windows API functions by hash. Network communication occurs via HTTPS with Protocol Buffers that are encrypted with ChaCha20. Read our entire analysis here:"
X Link 2025-12-02T15:26Z 7928 followers, 10.1K engagements
"Zscaler ThreatLabz has published a technical analysis of the BlackForce phishing kit designed to evade detection and bypass MFA using Man-in-the-Browser attacks. BlackForce employs techniques such as blocklists and a dual-channel communication architecture to separate the phishing panel from the stolen data which is dropped to Telegram. Read the full analysis here:"
X Link 2025-12-11T18:49Z 7928 followers, 6477 engagements