[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@TrendMicroRSRCH Trend Micro ResearchTrend Micro Research posts on X about $4704t, micro, ai, agentic the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence technology brands XXXX% finance XXXX% countries XXXX%
Social topic influence $4704t #4, micro #119, ai 32.65%, agentic #295, native #1733, secret 8.16%, target 7.14%, whatsapp 6.12%, stolen 5.1%, cloud XXXX%
Top accounts mentioned or mentioned by @trendmicro @aisechub
Top posts by engagements in the last XX hours
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-06T14:00Z 51.6K followers, XXX engagements
"ValleyRAT spreads via email and exploits Foxit PDF Reader targeting job seekers who regularly check for employment updates. Recognize the attack techniques and learn how to stay secure in our detailed research:"
X Link 2025-12-07T17:00Z 51.6K followers, 1373 engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-09T01:00Z 51.6K followers, XXX engagements
"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-09T05:00Z 51.6K followers, XXX engagements
"Job seekers looking for new opportunities may have their devices compromised as ValleyRAT abuses Foxit PDF Reader. Learn how this threat works and get protection strategies in our full report on the Trend Micro blog:"
X Link 2025-12-10T04:00Z 51.6K followers, XXX engagements
"Job seekers looking for new opportunities may have their devices compromised as ValleyRAT abuses Foxit PDF Reader. Learn how this threat works and get protection strategies in our full report on the Trend Micro blog:"
X Link 2025-12-12T01:00Z 51.6K followers, XXX engagements
"Cybercriminals are rapidly exploring AI but adoption follows clear patterns. Discover the three laws shaping how and why attackers integrate AI into their operations. See the full analysis and learn how you can stay ahead:"
X Link 2025-12-12T05:00Z 51.6K followers, XXX engagements
"The Trend Micro Security Predictions 2026 report is out AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-11-25T11:00Z 51.6K followers, 1692 engagements
"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-10T07:00Z 51.6K followers, XXX engagements
"Trend Researchs analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis:"
X Link 2025-12-11T09:00Z 51.6K followers, XXX engagements
"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-12T11:00Z 51.6K followers, XXX engagements
"As AI models become more capable and less constrained the risks of misuse increase. Trend Micros research on Xanthorox highlights how fine-tuning commercial models with explicit data can bypass safety mechanisms and enable harmful outputs. Find out more:"
X Link 2025-11-23T11:00Z 51.6K followers, XXX engagements
"The DragonForce ransomware utilizes advanced hacking tools to scan networks identify accounts and extract sensitive information before deploying the ransomware. Trend Researchs guide outlines the warning signs and steps everyone can take to reduce risk. Read the details:"
X Link 2025-11-25T09:00Z 51.6K followers, XXX engagements
"Cyberthreats are evolving fast as attackers use AI and automation to scale campaigns across cloud and hybrid environments. Layered risk-based security and proactive defense are essential for resilience. Know more about the AI-fication of cyberthreats:"
X Link 2025-11-25T15:00Z 51.6K followers, XXX engagements
"AI is set to transform the threat landscape driving adaptive attacks and exploiting operational systems. Expect risks from agentic AI unsecure vibe coding and advanced AI-powered deception like deepfakes and social engineering. Read Trend Micro's Security Predictions for 2026:"
X Link 2025-11-25T19:00Z 51.6K followers, XXX engagements
"Trend Micro experts predict that APTs will use AI and automation for faster stealthier attacks targeting supply chains and critical sectors with personalized tactics. Prepare for whats ahead with Trend Micro's Security Predictions for 2026:"
X Link 2025-11-26T05:00Z 51.6K followers, XXX engagements
"Lumma Stealer is experiencing a resurgence now leveraging advanced browser fingerprinting to evade detection and assess victim environments. Trend Vision One detects and blocks these evolving threats. Read Trend Researchs recent report:"
X Link 2025-11-28T05:00Z 51.6K followers, XXX engagements
"Lumma Stealer shows reduced underground visibility and degraded coordination but marketplace trading and endpoint targeting continue. Operators remain cautious maintaining basic activity. Full assessment:"
X Link 2025-11-30T07:00Z 51.6K followers, XXX engagements
"In Trend Researchs recent report we explore five types of Amazon S3 attacks combining both observed attack techniques and potential future vectors that exploit misconfigured bucket settings and access controls. Learn more:"
X Link 2025-12-01T14:00Z 51.6K followers, XXX engagements
"Water Saci in Brazil leverages a layered attack chain using HTA files ZIP archives and PDFs to evade detection and complicate analysis. Learn how to counter these evolving tactics in our latest research:"
X Link 2025-12-02T23:00Z 51.6K followers, XXX engagements
"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-03T05:00Z 51.6K followers, XXX engagements
"Securing LLMs and other AI applications is now a business imperative. Our guide details best practices for early threat modeling and runtime defense. Download now:"
X Link 2025-12-03T14:00Z 51.6K followers, XXX engagements
"Ransomware tactics are evolving to target cloud-native assets like Amazon S3 exploiting misconfigurations and stolen credentials to disrupt operations and evade traditional defenses. Heres what you need to know:"
X Link 2025-12-04T01:00Z 51.6K followers, XXX engagements
"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-04T09:00Z 51.6K followers, XXX engagements
"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-04T11:00Z 51.6K followers, XXX engagements
"AI will automate zero-day discovery and exploitation expanding the attack surface for organizations. Learn how to address the risks in Trend Micros Security Predictions for 2026 report:"
X Link 2025-12-04T22:00Z 51.6K followers, XXX engagements
"Detecting AI-driven fraud requires more than traditional controls. We demonstrate how AI service platforms can automate the creation of fake products as well as fake promotional videos to lure victims shopping online. Learn more:"
X Link 2025-12-05T01:00Z 51.6K followers, XXX engagements
"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-05T05:00Z 51.6K followers, XXX engagements
"WhatsApp is being weaponized as a self-propagating malware channel. Counter Water Saci by disabling auto-downloads restricting file transfers enforcing MFA and deploying Trend Vision One. Learn more in our full report:"
X Link 2025-12-05T07:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-05T11:00Z 51.6K followers, XXX engagements
"Browser fingerprinting is now a key tactic in Lumma Stealers arsenal enabling threat actors to assess environments and evade detection. Discover how Trend Micros AI-powered solutions address these risks. Full analysis:"
X Link 2025-12-05T14:00Z 51.6K followers, XXX engagements
"Shai-hulud XXX introduces credential theft targeting major cloud platforms NPM tokens and GitHub authentication credentials. Read the full report on our blog for comprehensive insights:"
X Link 2025-12-06T01:00Z 51.6K followers, XXX engagements
"Trend Micro experts predict that APTs will use AI and automation for faster stealthier attacks targeting supply chains and critical sectors with personalized tactics. Prepare for whats ahead with Trend Micro's Security Predictions for 2026:"
X Link 2025-12-06T05:00Z 51.6K followers, XXX engagements
"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-06T17:00Z 51.6K followers, XXX engagements
"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-07T01:00Z 51.6K followers, XXX engagements
"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-07T07:00Z 51.6K followers, XXX engagements
"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-07T11:00Z 51.6K followers, XXX engagements
"Shai-hulud XXX introduces credential theft targeting major cloud platforms NPM tokens and GitHub authentication credentials. Read the full report on our blog for comprehensive insights:"
X Link 2025-12-07T14:00Z 51.6K followers, XXX engagements
"AI is set to transform the threat landscape driving adaptive attacks and exploiting operational systems. Expect risks from agentic AI unsecure vibe coding and advanced AI-powered deception like deepfakes and social engineering. Read:"
X Link 2025-12-11T17:00Z 51.6K followers, XXX engagements
"Xanthorox is an AI model with a persona-driven design crafted to mimic specific traits for user engagement. Our research shows that this increases risks of roleplay-based attacks and prompt injection. Heres what you need to know:"
X Link 2025-11-23T05:00Z 51.6K followers, XXX engagements
"AI automation deepfake fraud and persistent legacy gaps will reshape enterprise security in 2026. Our upcoming report highlights why taking action now is critical for long-term resilience and operational stability. Watch for the release soon"
X Link 2025-11-23T07:00Z 51.6K followers, XXX engagements
"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our latest research:"
X Link 2025-11-23T09:00Z 51.6K followers, XXX engagements
"AI-powered scams now function with assembly line efficiency leveraging automation to mass-produce deepfakes and fraudulent listings. Trend Research replicated an AI-powered assembly line that creates and enables the scaling of merchandise scams:"
X Link 2025-11-23T21:00Z 51.6K followers, XXX engagements
"Agentic semi-automated AI attacks are changing cybersecurity. A China-aligned group used Anthropics Claude Code to automate espionage across XX organizations bypassing guardrails with minimal oversight. Enterprises must invest in stronger safeguards. Read:"
X Link 2025-11-26T07:00Z 51.6K followers, XXX engagements
"AI will automate zero-day discovery and exploitation expanding the attack surface for organizations. Learn how to address the risks in Trend Micros Security Predictions for 2026 report:"
X Link 2025-11-26T14:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs latest report:"
X Link 2025-11-27T09:30Z 51.6K followers, XXX engagements
"Shai-hulud XXX introduces credential theft targeting major cloud platforms NPM tokens and GitHub authentication credentials. Read the full report on our blog for comprehensive insights:"
X Link 2025-11-27T10:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs latest report:"
X Link 2025-11-28T12:00Z 51.6K followers, XXX engagements
"Shai-hulud XXX exhibits destructive fallback mechanisms wiping data when unable to harvest secrets. For a deeper analysis visit our blog for the full report:"
X Link 2025-11-29T07:00Z 51.6K followers, XXX engagements
"We predict that ransomware will shift to fully AI-driven attacks using automation and generative AI for personalized extortion stealthy infiltration and even automated negotiation. Read our Security Predictions for 2026:"
X Link 2025-11-30T01:00Z 51.6K followers, XXX engagements
"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-01T09:00Z 51.6K followers, XXX engagements
"AI will accelerate zero-day vulnerability discovery and exploitation targeting supply chains open-source software IoT/OT devices and AI environments. Watch for new risks like prompt injection and model backdoors. Learn more:"
X Link 2025-12-01T11:00Z 51.6K followers, XXX engagements
"Cyberthreats are evolving fast as attackers use AI and automation to scale campaigns across cloud and hybrid environments. Layered risk-based security and proactive defense are essential for resilience. Know more about the AI-fication of cyberthreats:"
X Link 2025-12-01T17:00Z 51.6K followers, XXX engagements
"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-02T01:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs latest report:"
X Link 2025-12-02T05:00Z 51.6K followers, XXX engagements
"Detecting AI-driven fraud requires more than traditional controls. We demonstrate how AI service platforms can automate the creation of fake products as well as fake promotional videos to lure victims shopping online. Learn more:"
X Link 2025-12-02T07:00Z 51.6K followers, XXX engagements
"Xanthorox is an AI model with a persona-driven design crafted to mimic specific traits for user engagement. Our research shows that this increases risks of roleplay-based attacks and prompt injection. Heres what you need to know:"
X Link 2025-12-02T11:00Z 51.6K followers, XXX engagements
"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our recent research:"
X Link 2025-12-03T11:00Z 51.6K followers, XXX engagements
"AI security isnt optional. Integrate threat modeling guardrails and zero trust architecture from day zero to prevent rework and ensure innovation. Download our full guide:"
X Link 2025-12-04T05:00Z 51.6K followers, XXX engagements
"🚨 A critical (CVSS 10.0) pre-authentication RCE vulnerability CVE-2025-55182 (also known as React2Shell) is affecting React Server Components used in React.js Next.js and related frameworks. Early exploitation is already surfacing and teams should prioritize immediate updates and protective controls. Stay ahead of the risk and strengthen your defenses with @TrendMicro solutions for this vulnerability:"
X Link 2025-12-05T05:01Z 51.6K followers, 1139 engagements
"🚨 A critical (CVSS 10.0) pre-authentication RCE vulnerability CVE-2025-55182 (also known as React2Shell) is affecting React Server Components used in React.js Next.js and related frameworks. Early exploitation is already surfacing and teams should prioritize immediate updates and protective controls. Stay ahead of the risk and strengthen your defenses with @TrendMicro solutions for this vulnerability:"
X Link 2025-12-06T03:00Z 51.6K followers, XXX engagements
"Agentic semi-automated AI attacks are changing cybersecurity. A China-aligned group used Anthropics Claude Code to automate espionage across XX organizations bypassing guardrails with minimal oversight. Read more:"
X Link 2025-12-06T07:00Z 51.6K followers, XXX engagements
"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our latest research:"
X Link 2025-12-08T14:00Z 51.6K followers, XXX engagements
"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-08T17:00Z 51.6K followers, XXX engagements
"Agentic AI is automating schemes and enabling attacks at massive scale and speed. Social engineering schemes can now target millions simultaneously making volume-based fraud highly profitable. Read the full research on our blog:"
X Link 2025-12-09T09:00Z 51.6K followers, XXX engagements
"Ransomware tactics are evolving to target cloud-native assets like Amazon S3 exploiting misconfigurations and stolen credentials to disrupt operations and evade traditional defenses. Heres what you need to know:"
X Link 2025-12-09T11:00Z 51.6K followers, XXX engagements
"AI-powered scams now function with assembly line efficiency leveraging automation to mass-produce deepfakes and fraudulent listings. Trend Research replicated an AI-powered assembly line that creates and enables scaling of merchandise scams. Read:"
X Link 2025-12-09T14:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-10T17:00Z 51.6K followers, XXX engagements
"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-11T01:00Z 51.6K followers, XXX engagements
"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our recent research:"
X Link 2025-12-11T07:00Z 51.6K followers, XXX engagements
"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-11T11:00Z 51.6K followers, XXX engagements
"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-11T14:00Z 51.6K followers, XXX engagements
"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs latest report:"
X Link 2025-12-12T07:00Z 51.6K followers, XXX engagements
"CVE-2025-55182 (React2Shell) is a CVSS XXXX vulnerability in React Server Components that enables remote code execution without authentication. Trend Researchs analysis examines the risks and mitigation strategies. Full report:"
X Link 2025-12-12T14:00Z 51.6K followers, XXX engagements
"Agentic AI is automating schemes and enabling attacks at massive scale and speed. Social engineering schemes can now target millions simultaneously making volume-based fraud highly profitable. Read the full research on our blog:"
X Link 2025-12-12T17:00Z 51.6K followers, XXX engagements
"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-13T05:00Z 51.6K followers, XX engagements