[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@TrendMicroRSRCH Avatar @TrendMicroRSRCH Trend Micro Research

Trend Micro Research posts on X about $4704t, ai, agentic, target the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

Mentions: XX #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence finance XXXX% technology brands XXXX% countries XXXX%

Social topic influence $4704t #4, ai 18.03%, agentic #482, target 4.92%, native #1169, secret 4.1%, what you 3.28%, whatsapp 3.28%, products 2.46%, vibe coding XXXX%

Top accounts mentioned or mentioned by @trendmicro @aisechub

Top Social Posts

Top posts by engagements in the last XX hours

"AI-powered scams now function with assembly line efficiency leveraging automation to mass-produce deepfakes and fraudulent listings. Trend Research replicated an AI-powered assembly line that creates and enables scaling of merchandise scams. Read:"
X Link 2025-12-09T14:00Z 51.6K followers, XXX engagements

"AI automation deepfake fraud and persistent legacy gaps will reshape enterprise security in 2026. Our upcoming report highlights why taking action now is critical for long-term resilience and operational stability. Watch for the release soon"
X Link 2025-11-23T07:00Z 51.6K followers, XXX engagements

"Ransomware tactics are evolving to target cloud-native assets like Amazon S3 exploiting misconfigurations and stolen credentials to disrupt operations and evade traditional defenses. Heres what you need to know:"
X Link 2025-11-25T07:00Z 51.6K followers, XXX engagements

"The Trend Micro Security Predictions 2026 report is out AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-11-25T11:00Z 51.6K followers, 1588 engagements

"AI is set to transform the threat landscape driving adaptive attacks and exploiting operational systems. Expect risks from agentic AI unsecure vibe coding and advanced AI-powered deception like deepfakes and social engineering. Read Trend Micro's Security Predictions for 2026:"
X Link 2025-11-25T19:00Z 51.6K followers, XXX engagements

"Lumma Stealer is experiencing a resurgence now leveraging advanced browser fingerprinting to evade detection and assess victim environments. Trend Vision One detects and blocks these evolving threats. Read Trend Researchs recent report:"
X Link 2025-11-28T05:00Z 51.6K followers, XXX engagements

"We predict that ransomware will shift to fully AI-driven attacks using automation and generative AI for personalized extortion stealthy infiltration and even automated negotiation. Read our Security Predictions for 2026:"
X Link 2025-11-30T01:00Z 51.6K followers, XXX engagements

"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-01T09:00Z 51.6K followers, XXX engagements

"In Trend Researchs recent report we explore five types of Amazon S3 attacks combining both observed attack techniques and potential future vectors that exploit misconfigured bucket settings and access controls. Learn more:"
X Link 2025-12-01T14:00Z 51.6K followers, XXX engagements

"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-02T01:00Z 51.6K followers, XXX engagements

"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs latest report:"
X Link 2025-12-02T05:00Z 51.6K followers, XXX engagements

"Xanthorox is an AI model with a persona-driven design crafted to mimic specific traits for user engagement. Our research shows that this increases risks of roleplay-based attacks and prompt injection. Heres what you need to know:"
X Link 2025-12-02T11:00Z 51.6K followers, XXX engagements

"Browser fingerprinting is now a key tactic in Lumma Stealers arsenal enabling threat actors to assess environments and evade detection. Discover how Trend Micros AI-powered solutions address these risks. Full analysis:"
X Link 2025-12-02T17:00Z 51.6K followers, XXX engagements

"Securing LLMs and other AI applications is now a business imperative. Our guide details best practices for early threat modeling and runtime defense. Download now:"
X Link 2025-12-03T14:00Z 51.6K followers, XXX engagements

"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-04T11:00Z 51.6K followers, XXX engagements

"AI will automate zero-day discovery and exploitation expanding the attack surface for organizations. Learn how to address the risks in Trend Micros Security Predictions for 2026 report:"
X Link 2025-12-04T22:00Z 51.6K followers, XXX engagements

"Detecting AI-driven fraud requires more than traditional controls. We demonstrate how AI service platforms can automate the creation of fake products as well as fake promotional videos to lure victims shopping online. Learn more:"
X Link 2025-12-05T01:00Z 51.6K followers, XXX engagements

"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-05T05:00Z 51.6K followers, XXX engagements

"WhatsApp is being weaponized as a self-propagating malware channel. Counter Water Saci by disabling auto-downloads restricting file transfers enforcing MFA and deploying Trend Vision One. Learn more in our full report:"
X Link 2025-12-05T07:00Z 51.6K followers, XXX engagements

"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-05T11:00Z 51.6K followers, XXX engagements

"Browser fingerprinting is now a key tactic in Lumma Stealers arsenal enabling threat actors to assess environments and evade detection. Discover how Trend Micros AI-powered solutions address these risks. Full analysis:"
X Link 2025-12-05T14:00Z 51.6K followers, XXX engagements

"Water Saci in Brazil leverages a layered attack chain using HTA files ZIP archives and PDFs to evade detection and complicate analysis. Learn how to counter these evolving tactics in our latest research:"
X Link 2025-12-05T17:00Z 51.6K followers, XXX engagements

"Job seekers looking for new opportunities may have their devices compromised as ValleyRAT abuses Foxit PDF Reader. Learn how this threat works and get protection strategies in our full report on the Trend Micro blog:"
X Link 2025-12-05T23:00Z 51.6K followers, XXX engagements

"Shai-hulud XXX introduces credential theft targeting major cloud platforms NPM tokens and GitHub authentication credentials. Read the full report on our blog for comprehensive insights:"
X Link 2025-12-06T01:00Z 51.6K followers, XXX engagements

"🚨 A critical (CVSS 10.0) pre-authentication RCE vulnerability CVE-2025-55182 (also known as React2Shell) is affecting React Server Components used in React.js Next.js and related frameworks. Early exploitation is already surfacing and teams should prioritize immediate updates and protective controls. Stay ahead of the risk and strengthen your defenses with @TrendMicro solutions for this vulnerability:"
X Link 2025-12-06T03:00Z 51.6K followers, XXX engagements

"Trend Micro experts predict that APTs will use AI and automation for faster stealthier attacks targeting supply chains and critical sectors with personalized tactics. Prepare for whats ahead with Trend Micro's Security Predictions for 2026:"
X Link 2025-12-06T05:00Z 51.6K followers, XXX engagements

"Agentic semi-automated AI attacks are changing cybersecurity. A China-aligned group used Anthropics Claude Code to automate espionage across XX organizations bypassing guardrails with minimal oversight. Read more:"
X Link 2025-12-06T07:00Z 51.6K followers, XXX engagements

"Detecting AI-driven fraud requires more than traditional controls. We demonstrate how AI service platforms can automate the creation of fake products as well as fake promotional videos to lure victims shopping online. Learn more:"
X Link 2025-12-06T11:00Z 51.6K followers, XXX engagements

"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-07T01:00Z 51.6K followers, XXX engagements

"Xanthorox is a large language model engineered to operate without ethical safety or legal restrictions. Our research shows how attackers could exploit its lack of guardrails for social engineering and phishing. Details here:"
X Link 2025-12-07T05:00Z 51.6K followers, XXX engagements

"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-07T07:00Z 51.6K followers, XXX engagements

"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-07T11:00Z 51.6K followers, XXX engagements

"Shai-hulud XXX introduces credential theft targeting major cloud platforms NPM tokens and GitHub authentication credentials. Read the full report on our blog for comprehensive insights:"
X Link 2025-12-07T14:00Z 51.6K followers, XXX engagements

"AI security isnt optional. Integrate threat modeling guardrails and zero trust architecture from day zero to prevent rework and ensure innovation. Download our full guide:"
X Link 2025-12-08T01:00Z 51.6K followers, XXX engagements

"Detecting AI-driven fraud requires more than traditional controls. We demonstrate how AI service platforms can automate the creation of fake products as well as fake promotional videos to lure victims shopping online. Learn more:"
X Link 2025-12-08T05:00Z 51.6K followers, XXX engagements

"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our latest research:"
X Link 2025-12-08T14:00Z 51.6K followers, XXX engagements

"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-06T14:00Z 51.6K followers, XXX engagements

"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-09T01:00Z 51.6K followers, XXX engagements

"Agentic AI is automating schemes and enabling attacks at massive scale and speed. Social engineering schemes can now target millions simultaneously making volume-based fraud highly profitable. Read the full research on our blog:"
X Link 2025-12-09T09:00Z 51.6K followers, XXX engagements

"Ransomware tactics are evolving to target cloud-native assets like Amazon S3 exploiting misconfigurations and stolen credentials to disrupt operations and evade traditional defenses. Heres what you need to know:"
X Link 2025-12-09T11:00Z 51.6K followers, XXX engagements

"Job seekers looking for new opportunities may have their devices compromised as ValleyRAT abuses Foxit PDF Reader. Learn how this threat works and get protection strategies in our full report on the Trend Micro blog:"
X Link 2025-12-10T04:00Z 51.6K followers, XXX engagements

"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-10T07:00Z 51.6K followers, XXX engagements

"Trend Researchs analysis of React2Shell (CVE-2025-55182) reveals a landscape filled with fake scanners and tools with many spreading misinformation or even introducing backdoors. Read our analysis:"
X Link 2025-12-11T09:00Z 51.6K followers, XXX engagements

"🚨 A critical (CVSS 10.0) pre-authentication RCE vulnerability CVE-2025-55182 (also known as React2Shell) is affecting React Server Components used in React.js Next.js and related frameworks. Early exploitation is already surfacing and teams should prioritize immediate updates and protective controls. Stay ahead of the risk and strengthen your defenses with @TrendMicro solutions for this vulnerability:"
X Link 2025-12-05T05:01Z 51.6K followers, 1122 engagements

"Threat actors are exploiting jailbroken LLMs and agentic AI to automate cyberattacks with minimal oversight. Anthropics Claude Code was recently used to target XX organizations for reconnaissance and data theft. Read:"
X Link 2025-12-06T17:00Z 51.6K followers, XXX engagements

"ValleyRAT spreads via email and exploits Foxit PDF Reader targeting job seekers who regularly check for employment updates. Recognize the attack techniques and learn how to stay secure in our detailed research:"
X Link 2025-12-07T17:00Z 51.6K followers, 1373 engagements

"As agentic AI matures expect accelerated flexible and scalable attacks targeting cloud and AI infrastructure. Enterprises should anticipate specialized criminal marketplaces and evolving threat vectors making proactive risk planning essential. Read:"
X Link 2025-12-08T07:00Z 51.6K followers, XXX engagements

"Xanthorox is an AI model with a persona-driven design crafted to mimic specific traits for user engagement. Our research shows that this increases risks of roleplay-based attacks and prompt injection. Heres what you need to know:"
X Link 2025-12-08T11:00Z 51.6K followers, XXX engagements

"Trend Vision One centralizes cyber risk management delivering robust protection against threats like Lumma Stealer across all environments. Trend Micros intelligence reports and hunting queries support targeted effective defense. Learn more:"
X Link 2025-12-08T17:00Z 51.6K followers, XXX engagements

"AI-driven code conversion is fueling rapid malware innovation. Water Saci leverages LLMs for automated attacks and uses WhatsApp as a self-propagating channel. Layered defenses and user awareness are critical. Read our full analysis:"
X Link 2025-12-09T05:00Z 51.6K followers, XXX engagements

"As a remote access trojan ValleyRAT can allow attackers to control systems and steal data. Learn more about the campaigns impact and how to defend against it. Read our complete research on the blog:"
X Link 2025-12-09T07:00Z 51.6K followers, XXX engagements

"The latest variant of Shai-hulud XXX leverages stolen cloud credentials to access native secret management services. If unsuccessful it executes destructive code to wipe user data. Learn more about these tactics in Trend Researchs recent report:"
X Link 2025-12-10T17:00Z 51.6K followers, XXX engagements

"AI will drive automated cyberattacks enabling AI-powered malware deepfakes and stealthy threats targeting trusted systems. Prepare for new risks with Trend Micros Security Predictions for 2026:"
X Link 2025-12-11T14:00Z 51.6K followers, XXX engagements

"S3 ransomware is targeting cloud environments by exploiting misconfigurations and stolen credentials to access delete or extract data often bypassing traditional defenses. Learn how to protect your cloud assets in our recent research:"
X Link 2025-12-11T07:00Z 51.6K followers, XXX engagements

"AI is set to transform the threat landscape driving adaptive attacks and exploiting operational systems. Expect risks from agentic AI unsecure vibe coding and advanced AI-powered deception like deepfakes and social engineering. Read:"
X Link 2025-12-11T17:00Z 51.6K followers, X engagements