[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@ekopartyconference Ekoparty Security ConferenceEkoparty Security Conference posts on YouTube about red, bounty, ai, qu the most. They currently have XXXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.
Social category influence technology brands XXXXX% countries XXXXX% stocks XXXX% luxury brands XXXX% fashion brands XXXX% champions league XXXX% social networks XXXX% finance XXXX%
Social topic influence red 15.79%, bounty #550, ai 7.89%, qu #1316, lo 5.26%, argentina 5.26%, cybersecurity 5.26%, bypass 5.26%, how to 5.26%, tier XXXX%
Top assets mentioned Alphabet Inc Class A (GOOGL) Accenture (ACN)
Top posts by engagements in the last XX hours
"Ms all del pentesting web tradicional: incorporando inteligencia ofensiva y TTPs - Yoel Apu"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"I'm DA and now what: Internal facts and methodology - Cesar Soto"
YouTube Link 2025-12-11T17:32Z 14K followers, XX engagements
"Red cuntica de nodos entrelazados. - Dr. Facundo Caram"
YouTube Link 2025-12-09T20:26Z 14K followers, XX engagements
"La Ciberinteligencia como ventaja para combatir fraudes digitales -Braian Arroyo Y Ezequiel Invernon"
YouTube Link 2025-12-11T17:35Z 14K followers, XX engagements
"Lecciones del AWS CIRT: Entendiendo el initial Access - Dario Goldfarb"
YouTube Link 2025-12-10T16:56Z 14K followers, XX engagements
"When giants fall: XSS in Meta through code review - Ileana Maricel Barrionuevo"
YouTube Link 2025-12-09T22:32Z 14K followers, XX engagements
"Impro4Hackers Vol. II - Daniel Isler"
YouTube Link 2025-12-09T20:25Z 14K followers, XX engagements
"Qu rompimos - Carlos Benitez - QUANTUM Village"
YouTube Link 2025-12-09T20:26Z 14K followers, XX engagements
"Breaking Client-Side Encryption for Bounties - Samuel Orellana (aka: samux)"
YouTube Link 2025-12-09T22:32Z 14K followers, XXX engagements
"Python para hacking de machine learning"- Christian Camilo Urcuqui Lpez - AI RESILIENCE HUB"
YouTube Link 2025-12-10T16:56Z 14K followers, XX engagements
"ChaosOps: Un mundo con caos es un mundo mejor - Matias Armndola / Axel Labruna"
YouTube Link 2025-12-10T17:10Z 14K followers, XX engagements
"Fast and Furious: Reto DevSecOps"- Matias Ferreira y Matias Armndola - DevSecOps Space"
YouTube Link 2025-12-10T17:10Z 14K followers, XX engagements
"Yrprey Frameworks to Exploitation OWASP TOP XX API - Fernando Mengali"
YouTube Link 2025-12-09T20:24Z 14K followers, XX engagements
"Lock Picking XXX - Bobby Graydon"
YouTube Link 2025-12-11T17:27Z 14K followers, XX engagements
"Dont get hacked while you hack: detecting prompt injection in the wild - Martin Doyhenard"
YouTube Link 2025-12-09T22:32Z 14K followers, XX engagements
"No CVE No Problem: Uncovering Hidden Attack Paths in Active Directory - Gerardo Mejia"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Hunting in Google Cloud: Command injection in Vertex AI - Valentino Massaro"
YouTube Link 2025-12-09T22:32Z 14K followers, XX engagements
"Fast and Furious: Reto Supply Chain Security en DevOps"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Protecting against Forcible Entry"
YouTube Link 2025-12-11T17:27Z 14K followers, X engagements
"BypaXSS - The Brute Art of Bypass - Rodolfo Assis aka "Brute"
YouTube Link 2025-12-09T22:32Z 14K followers, XX engagements
"Red Team Operations in Cloud Environments: Emulating Adversaries in AWS - Galoget Latorre"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Bypass XXX - Bill Graydon - Physical Security Village"
YouTube Link 2025-12-11T17:27Z 14K followers, XX engagements
"Instagram User Token Impersonation: From discovery to defense in depth"
YouTube Link 2025-12-09T22:32Z 14K followers, XXX engagements
"Breaking the Cover: Advanced TOR Deanonymization Techniques and Real-World Attacks-Francisco Canteli"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Stories from a Tor dev - Roger Dingledine"
YouTube Link 2025-12-11T17:30Z 14K followers, X engagements
"Recon Inverso: Bug Bounty Edition - debsec"
YouTube Link 2025-12-09T22:32Z 14K followers, XXX engagements
"Ciberseguridad en AmbientesIndustriales: Desafos y Aportes- D. Manrique J. Castro y J. Kamlofsky"
YouTube Link 2025-12-09T20:25Z 14K followers, XX engagements
"Bypass XXX - Terry Luan - Physical Security Village"
YouTube Link 2025-12-11T17:27Z 14K followers, X engagements
"De la Mquina Enigma a la era Poscuntica: Perodo II: La era de la criptografa de clave pblica"
YouTube Link 2025-12-10T16:55Z 14K followers, XX engagements
"PhishOps like an APT: Simulando Adversarios para el Acceso Inicial - Gerardo Mejia"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Presione play: nivel uno del mundo laboral - Bug Bounty Girls Club"
YouTube Link 2025-12-09T20:23Z 14K followers, XX engagements
"Confiar no es una Estrategia: Cmo fallan los controles en produccin sin que nadie se entere"
YouTube Link 2025-12-10T17:10Z 14K followers, XX engagements
"PAYGoat: Playing with Broken Money Flows - Cesar Calderon"
YouTube Link 2025-12-11T17:37Z 14K followers, XX engagements
"Chasing Dragons With AI - Montserrat Patino"
YouTube Link 2025-12-09T20:23Z 14K followers, XX engagements
"Desmistificando la evasin de EDRs - Vctor Contreras"
YouTube Link 2025-12-11T17:32Z 14K followers, XX engagements
"Red Team: Chaos as a Service (CaaS) - Fabiola Oliveros"
YouTube Link 2025-12-11T17:32Z 14K followers, X engagements
"Fraud as a Service: Orquestando la defensa en tiempo real - Sebastian Cafaro & Ivo Rusconi"
YouTube Link 2025-12-11T17:37Z 14K followers, X engagements