[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@TrendMicroRSRCH Avatar @TrendMicroRSRCH Trend Micro Research

Trend Micro Research posts on X about $4704t, micro, whatsapp, targets the most. They currently have XXXXXX followers and 1056 posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

Mentions: XX #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands XXXX% stocks XXXX% finance XXXX% travel destinations XXXX%

Social topic influence $4704t #4, micro #481, whatsapp 0.66%, targets #1493, checkpoint 0.19%, deposit 0.09%, loading #674, realtime 0.09%, comms 0.09%, oracle XXXX%

Top accounts mentioned or mentioned by @interpolcybers @trendmicro @interpolcyber @bobmcardle @thezdi @thezdis @aisechub @gothburz @ricamati @slatornews @medsci_yb3r @samanthaa86879 @world_dais @jeremy_may3r @buracarac @kuffourfra50264 @thisism23567356

Top assets mentioned Hundred Million (100M)

Top Social Posts #


Top posts by engagements in the last XX hours

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.9K followers, XXX engagements

"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"
X Link @TrendMicroRSRCH 2025-10-08T05:00Z 51.9K followers, XXX engagements

"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"
X Link @TrendMicroRSRCH 2025-10-06T21:00Z 51.9K followers, XXX engagements

"1/8 Trend Micros latest analysis found that the Chaos ransomware campaign is leveraging advanced anti-EDR techniques. Our telemetry confirms malicious DLL sideloading and kernel-level driver deployment enabling broad defense evasion"
X Link @TrendMicroRSRCH 2025-09-30T09:00Z 51.9K followers, XXX engagements

"4/5: To minimize risk associated with SORVEPOTEL consider these defense items: ✅ Disable auto-downloads on WhatsApp. ✅ Control file transfers on personal apps. ✅ Enhance user awareness through regular security training to help employees"
X Link @TrendMicroRSRCH 2025-10-03T05:40Z 51.9K followers, XXX engagements

"The LockBit XXX ransomware targets Windows Linux and ESXi endpoints and servers increasing risk across multiple platforms. Strengthen defenses with layered protection cross-platform visibility EDR and log correlation. Explore our threat hunting guidance:"
X Link @TrendMicroRSRCH 2025-10-13T14:00Z 51.9K followers, XXX engagements

"By embedding cloud credentials in its code AI app Wondershare RepairIt left user photos and internal assets exposed despite privacy policy claims. Attackers could exploit this to manipulate files or distribute malicious updates through legitimate channels. Find out how to defend against such threats:"
X Link @TrendMicroRSRCH 2025-10-09T05:00Z 51.9K followers, XXX engagements

"Over XX% of SORVEPOTEL infections affect Brazils government and manufacturing sectors resulting in mass account bans due to spam-like activity. Review platform logs for automation and restrict file sharing on business messaging apps. Learn more:"
X Link @TrendMicroRSRCH 2025-10-06T17:00Z 51.9K followers, XXX engagements

"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-07T01:00Z 51.9K followers, XXX engagements

"The recent spike in task scam reports to the FTC suggest that cybercriminals are getting big payouts from these scams. Attackers are using initial small payouts and escalating deposit requests. Learn what a task scam is the modus operandi and how you can safeguard yourself from this threat:"
X Link @TrendMicroRSRCH 2025-09-30T07:00Z 51.9K followers, XXX engagements

"A flaw in NVIDIA Merlin highlights how model checkpoint loading can lead to remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-04T14:53Z 51.9K followers, XXX engagements

"Mark Hoult of DataBank shares how expert threat intelligence from Trend Micro and CISA helped cut through media noise surrounding the recent SharePoint vulnerability. Here is his perspective:"
X Link @TrendMicroRSRCH 2025-09-19T05:00Z 51.9K followers, XXX engagements

"Wondershare RepairIt an AI app embedded cloud credentials in its code exposing user photos and internal assets. Attackers could manipulate files or deliver malicious updates via trusted channels. Learn more:"
X Link @TrendMicroRSRCH 2025-10-08T01:00Z 51.9K followers, XXX engagements

"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.9K followers, XXX engagements

"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. More about its multi-layered approach:"
X Link @TrendMicroRSRCH 2025-10-13T06:40Z 51.9K followers, XXX engagements

"When software contains embedded credentials attackers can target the supply chain and manipulate distributed updates. We detail the risks and offer guidance for organizations to secure their software:"
X Link @TrendMicroRSRCH 2025-10-13T09:00Z 51.9K followers, XXX engagements

"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"
X Link @TrendMicroRSRCH 2025-10-10T01:00Z 51.9K followers, XXX engagements

"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"
X Link @TrendMicroRSRCH 2025-10-13T11:00Z 51.9K followers, XXX engagements

"Agentic edge AI brings real-time autonomy to wearables robotics and security systemsbut advanced attacks that result in IP theft and operational disruption demand robust security. Trend Micro details key threats and mitigation strategies in our full research:"
X Link @TrendMicroRSRCH 2025-10-13T05:00Z 51.9K followers, XXX engagements

"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"
X Link @TrendMicroRSRCH 2025-10-13T07:00Z 51.9K followers, XXX engagements

"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"
X Link @TrendMicroRSRCH 2025-10-13T21:00Z 51.9K followers, XXX engagements

"3/5: SORVEPOTEL begins with phishing via WhatsApp often from a compromised contact delivering a ZIP file disguised as a receipt budget or health document. After infection SORVEPOTEL maintains persistence on the device and abuses the victims WhatsApp account to spread further"
X Link @TrendMicroRSRCH 2025-10-03T05:40Z 51.9K followers, XXX engagements

"CVE-2025-23298 demonstrates how a single poisoned model could trigger remote code execution in AI/ML workflows. Trend Micro ZDI team breaks down the attack surface and real-world consequences of this NVIDIA Merlin flaw:"
X Link @TrendMicroRSRCH 2025-10-02T05:00Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Learn more about its infection chain here:"
X Link @TrendMicroRSRCH 2025-10-07T21:00Z 51.9K followers, XXX engagements

"In August 2025 Trend Micro uncovered a new ransomware campaign led by The Gentlemen a previously undocumented threat group. Our latest research provides an in-depth look at their tools targets and strategies. Explore our report and strengthen your defenses:"
X Link @TrendMicroRSRCH 2025-09-16T17:00Z 51.9K followers, XXX engagements

"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-01T07:00Z 51.9K followers, XXX engagements

"SORVEPOTEL malware is spreading via WhatsApp Web by sending unsolicited ZIP files to contacts. Opening these files on a desktop triggers automatic propagation to more users. Learn how to defend against this attack:"
X Link @TrendMicroRSRCH 2025-10-09T01:00Z 51.9K followers, XXX engagements

"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"
X Link @TrendMicroRSRCH 2025-10-14T01:00Z 51.9K followers, XXX engagements

"1/6 Oracle has released an emergency patch for CVE-2025-61882 a critical pre-authentication remote code execution vulnerability in E-Business Suite. Active exploitation has been observed demanding immediate action"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-14T05:00Z 51.9K followers, XXX engagements

"Recruitment firms and SMBs are frequent targets of brand impersonation scams. Scammers use professional-looking websites logos and bulk messaging to mimic trusted brands leveraging bigger companies industry reputation and smaller enterprises resource gaps in combatting impersonation. Learn more:"
X Link @TrendMicroRSRCH 2025-10-01T01:00Z 51.9K followers, XXX engagements

"1/5: LATEST NEWS: Trend Research has identified an active campaign spreading via WhatsApp through a malicious ZIP attachment. The malware campaign named SORVEPOTEL establishes persistence and hijacks the victims account to send itself to all of the victim's contacts"
X Link @TrendMicroRSRCH 2025-10-03T05:40Z 51.9K followers, XXX engagements

"Trend Research exposes how attackers use SNMP and Telnet exploits to compromise Cisco switches and deploy rootkits. See how Trend Vision One enables proactive defense:"
X Link @TrendMicroRSRCH 2025-10-15T17:00Z 51.9K followers, 2697 engagements

"Trend Research shows attackers used phishing to gain privileged access to trusted Node Package Manager accounts injecting malicious code into widely adopted packages. Read our recommendations:"
X Link @TrendMicroRSRCH 2025-10-04T17:00Z 51.9K followers, XXX engagements

"Wondershare RepairIt a popular AI-powered image and video repair app put sensitive user photos at risk by embedding overly permissive cloud access tokens in its code. This security lapse also exposed company AI models software and source code contradicting privacy assurances. Learn how to protect your data and what organizations should do differently:"
X Link @TrendMicroRSRCH 2025-10-10T07:00Z 51.9K followers, XXX engagements

"@INTERPOL_Cybers Operation Serengeti XXX led to 1209 arrests and dismantled 11432 malicious infrastructures recovering nearly US$100M. This highlights the operation's scale and impact in reducing cybercrime across Africa. Learn more on our blog:"
X Link @TrendMicroRSRCH 2025-09-26T07:00Z 51.9K followers, XX engagements

"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"
X Link @TrendMicroRSRCH 2025-09-30T14:00Z 51.9K followers, XXX engagements

"5/6 We strongly advise applying Oracles official patch and supplementing with Trend Micros endpoint and network protections. Layered defense is key to minimizing risk"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XXX engagements

"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"
X Link @TrendMicroRSRCH 2025-10-13T17:00Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"
X Link @TrendMicroRSRCH 2025-10-11T07:00Z 51.9K followers, XXX engagements

"Read-only controls in MCP servers are often incomplete and can expose sensitive data if bypassed. Our research explains how these weaknesses arise and shows how strict tokens least privilege and container security protect your AI supply chain:"
X Link @TrendMicroRSRCH 2025-10-08T07:00Z 51.9K followers, XXX engagements

"The Trend Micro Zero Day Initiative uncovered CVE-2025-23298 in NVIDIA Merlin. This critical flaw could allow attackers to gain root-level access steal training data and poison AI models. Discover the real-world impact of this vulnerability in our full analysis:"
X Link @TrendMicroRSRCH 2025-10-03T01:00Z 51.9K followers, XXX engagements

"Automation saves time but can also save adversaries from exposure if their malicious flows go undetected. Trend Micros analysis explains the visibility gaps and how to plug them. Proactively secure your systems:"
X Link @TrendMicroRSRCH 2025-10-07T14:00Z 51.9K followers, XXX engagements