Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@Cyber_O51NT Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::877710712734232576.png) @Cyber_O51NT Cyber_OSINT

Cyber_OSINT posts on X about splunk, $zs, hidden, vmware the most. They currently have XXXXXX followers and 1297 posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::877710712734232576/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::877710712734232576/c:line/m:interactions.svg)

- X Week XXXXXX -XX%
- X Month XXXXXXX +1.50%
- X Months XXXXXXX +91%
- X Year XXXXXXX +37%

### Mentions: XX [#](/creator/twitter::877710712734232576/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::877710712734232576/c:line/m:posts_active.svg)

- X Week XX +9.10%
- X Month XXX -XXXX%
- X Months XXX +69%
- X Year XXX +69%

### Followers: XXXXXX [#](/creator/twitter::877710712734232576/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::877710712734232576/c:line/m:followers.svg)

- X Week XXXXXX +0.26%
- X Month XXXXXX +1.20%
- X Months XXXXXX +8.60%
- X Year XXXXXX +17%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::877710712734232576/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::877710712734232576/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  [stocks](/list/stocks)  [social networks](/list/social-networks) 

**Social topic influence**
[splunk](/topic/splunk), [$zs](/topic/$zs) #44, [hidden](/topic/hidden), [vmware](/topic/vmware) #56, [vulnerability](/topic/vulnerability) #67, [ai](/topic/ai), [citrix systems](/topic/citrix-systems), [apt](/topic/apt), [linked](/topic/linked), [target](/topic/target)

**Top accounts mentioned or mentioned by**
[@securityaffairs](/creator/undefined) [@mysteriousteam0](/creator/undefined) [@redeaglecrew](/creator/undefined) [@knownsec404teamunveilingthepastandpresentofaptk47weaponasyncshell5a98f75c2d68](/creator/undefined) [@asyncmutexmutex](/creator/undefined) [@nshcthreatreconhackingactivitiesofprorussiancybercrimegrouptargetingkoreancompanies8e349ae90401sourcerss9f451c67ad262](/creator/undefined) [@ctrltinycolor](/creator/undefined) [@nshcthreatreconatsunamisweepingthecyberbattlefieldanalysisofsectora01shackingactivitiese4d006baae2fsourcerss9f451c67ad262](/creator/undefined) [@hm_tech_travel](/creator/undefined) [@wikijm](/creator/undefined)

**Top assets mentioned**
[Zscaler Inc (ZS)](/topic/$zs) [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) [Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last XX hours

"FortiGuard Labs reports that ShadowV2 a new Mirai-based botnet emerged during the AWS outage targeting IoT devices and showcasing significant DDoS capabilities and a global footprint. #CyberSecurity #IoT"  
[X Link](https://x.com/Cyber_O51NT/status/1994296147150512628)  2025-11-28T06:43Z 20.1K followers, 1072 engagements


"FortiGuard Labs has reported new Symbiote and BPFdoor variants using eBPF filters to enhance stealth via IPv6 support UDP traffic and dynamic port hopping for covert C2 communication. #CyberSecurity #Malware"  
[X Link](https://x.com/Cyber_O51NT/status/1996009955040575639)  2025-12-03T00:13Z 20.1K followers, 2375 engagements


"Threat actors are reportedly exploiting CVE-2025-3248 to deliver the Flodrix Botnet targeting AI verticals and linked to the LeetHozer family. #CyberSecurity #FlodrixBotnet"  
[X Link](https://x.com/Cyber_O51NT/status/1938867124115492932)  2025-06-28T07:48Z 20.1K followers, XXX engagements


"Amazon's threat intelligence team has uncovered an advanced threat actor exploiting zero-days in Cisco and Citrix systems highlighting a worrying trend of attacks on critical identity and network access infrastructure. #Cybersecurity #ZeroDay"  
[X Link](https://x.com/Cyber_O51NT/status/1988765940461248652)  2025-11-13T00:28Z 20.1K followers, 2860 engagements


"The Splunk Threat Research Team highlights the NotDoor Outlook-macro backdoor linked to APT28 offering insights on detection methods to enhance security coverage. #CyberSecurity #APT28"  
[X Link](https://x.com/Cyber_O51NT/status/1989723380669456449)  2025-11-15T15:53Z 20.1K followers, 5044 engagements


"An analysis reveals "Hide Me Again" an updated .NET steganography loader delivering Lokibot malware focusing on evasion techniques MITRE ATT&CK TTPs and Splunk detections for improved threat identification. #CyberSecurity #Malware"  
[X Link](https://x.com/Cyber_O51NT/status/1989895912521388057)  2025-11-16T03:18Z 20.1K followers, 2421 engagements


"Zscaler Threat Hunting reports a sophisticated multi-stage attack by the Water Gamayun APT group exploiting a Windows vulnerability to deliver hidden PowerShell payloads through compromised sites and deceptive file extensions. #CyberSecurity #ThreatHunt"  
[X Link](https://x.com/Cyber_O51NT/status/1993491400772485584)  2025-11-26T01:26Z 20.1K followers, 4994 engagements


"Zscaler ThreatLabz reports that Matanbuchus XXX a C++ downloader linked to ransomware features advanced obfuscation and persistence methods evolving since its 2020 debut to evade detection and deploy payloads effectively. #CyberSecurity #Malware"  
[X Link](https://x.com/Cyber_O51NT/status/1996104268625952990)  2025-12-03T06:28Z 20.1K followers, 1617 engagements


"FortiGuard Labs reported that UDPGangster campaigns linked to MuddyWater are using macro-laden phishing lures and UDP backdoors to target multiple countries with advanced evasion techniques. #cybersecurity #malware"  
[X Link](https://x.com/Cyber_O51NT/status/1996586104649064673)  2025-12-04T14:23Z 20.1K followers, 2365 engagements


"CrowdStrike reports that the sophisticated China-nexus adversary WARP PANDA has been targeting U.S. VMware vCenter environments with BRICKSTORM malware employing advanced OPSEC and new implants Junction and GuestConduit for persistent access. #Cybersecu"  
[X Link](https://x.com/Cyber_O51NT/status/1996805081132351595)  2025-12-05T04:53Z 20.1K followers, 3306 engagements


"A recent article explores Castle RAT malware's techniques and tactics urging readers to build Splunk detections using MITRE ATT&CK to safeguard their networks against this advanced threat. #CyberSecurity #Malware"  
[X Link](https://x.com/Cyber_O51NT/status/1996810146421387623)  2025-12-05T05:13Z 20.1K followers, XXX engagements


"CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities catalog following a hacktivist attack on ScadaBR highlighting urgent security concerns in industrial control systems. #CyberSecurity #CISA"  
[X Link](https://x.com/Cyber_O51NT/status/1995685244880437367)  2025-12-02T02:43Z 20.1K followers, 1161 engagements


"A recent investigation revealed that K7 Antivirus has a significant privilege escalation vulnerability (CVE-2024-36424) due to named pipe abuse and registry manipulation allowing unprivileged users to alter critical settings. #Cybersecurity #Vulnerability"  
[X Link](https://x.com/Cyber_O51NT/status/1996009958949659003)  2025-12-03T00:13Z 20.1K followers, 1196 engagements


"DNS has unveiled the infrastructure behind ongoing SSO attacks targeting XX U.S. universities where Evilginx phishing tactics evade detection and compromise student credentials highlighting the need for preemptive defensive measures. #CyberSecurity"  
[X Link](https://x.com/Cyber_O51NT/status/1995679074417623125)  2025-12-02T02:19Z 20.1K followers, 1006 engagements


"Cato CTRL reveals that Claude Skills can be weaponized to execute ransomware like MedusaLocker exposing a consent gap where hidden operations can occur without user awareness posing a significant risk to enterprises. #CyberSecurity #Ransomware"  
[X Link](https://x.com/Cyber_O51NT/status/1996009953883001157)  2025-12-03T00:13Z 20.1K followers, 1112 engagements


"CISA NSA and the Canadian Cyber Centre warn that PRC state-sponsored hackers are employing a stealthy Go-based backdoor BRICKSTORM for long-term espionage against VMware systems in government and IT networks. #CyberSecurity #Malware"  
[X Link](https://x.com/Cyber_O51NT/status/1997685949598167420)  2025-12-07T15:13Z 20.1K followers, 2260 engagements


"Recent monitoring by XXX Threat Research Institute reveals that the Gamaredon group is leveraging CVE-2025-8088 to conduct spear-phishing attacks against Ukrainian government entities emphasizing the need for enhanced security measures. #CyberSecurity"  
[X Link](https://x.com/Cyber_O51NT/status/1997109681056076202)  2025-12-06T01:03Z 20.1K followers, 1002 engagements


"Amazon threat intelligence reports that China-nexus cyber threat groups including Earth Lamia and Jackpot Panda are rapidly exploiting the React2Shell vulnerability (CVE-2025-55182) with a CVSS score of XXXX urging immediate action for affected users"  
[X Link](https://x.com/Cyber_O51NT/status/1997119589302378949)  2025-12-06T01:43Z 20.1K followers, 1407 engagements


"CyberProof researchers report a resurgence of the Oyster backdoor utilizing SEO poisoning to deliver malicious software disguised as Microsoft Teams and Google Meet files with ties to ransomware groups expected to persist through 2026. #CyberSecurity"  
[X Link](https://x.com/Cyber_O51NT/status/1998376666502955272)  2025-12-09T12:58Z 20.1K followers, XXX engagements


"Cisco Talos has identified a new loader behind the DeadLock ransomware attack utilizing a BYOVD technique to exploit a Baidu Antivirus driver vulnerability disable security services and implement a sophisticated encryption process. #ransomware #cybers"  
[X Link](https://x.com/Cyber_O51NT/status/1998380548444553388)  2025-12-09T13:13Z 20.1K followers, 1686 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@Cyber_O51NT Avatar @Cyber_O51NT Cyber_OSINT

Cyber_OSINT posts on X about splunk, $zs, hidden, vmware the most. They currently have XXXXXX followers and 1297 posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX -XX%
  • X Month XXXXXXX +1.50%
  • X Months XXXXXXX +91%
  • X Year XXXXXXX +37%

Mentions: XX #

Mentions Line Chart

  • X Week XX +9.10%
  • X Month XXX -XXXX%
  • X Months XXX +69%
  • X Year XXX +69%

Followers: XXXXXX #

Followers Line Chart

  • X Week XXXXXX +0.26%
  • X Month XXXXXX +1.20%
  • X Months XXXXXX +8.60%
  • X Year XXXXXX +17%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence technology brands stocks social networks

Social topic influence splunk, $zs #44, hidden, vmware #56, vulnerability #67, ai, citrix systems, apt, linked, target

Top accounts mentioned or mentioned by @securityaffairs @mysteriousteam0 @redeaglecrew @knownsec404teamunveilingthepastandpresentofaptk47weaponasyncshell5a98f75c2d68 @asyncmutexmutex @nshcthreatreconhackingactivitiesofprorussiancybercrimegrouptargetingkoreancompanies8e349ae90401sourcerss9f451c67ad262 @ctrltinycolor @nshcthreatreconatsunamisweepingthecyberbattlefieldanalysisofsectora01shackingactivitiese4d006baae2fsourcerss9f451c67ad262 @hm_tech_travel @wikijm

Top assets mentioned Zscaler Inc (ZS) Crowdstrike Holdings Inc (CRWD) Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last XX hours

"FortiGuard Labs reports that ShadowV2 a new Mirai-based botnet emerged during the AWS outage targeting IoT devices and showcasing significant DDoS capabilities and a global footprint. #CyberSecurity #IoT"
X Link 2025-11-28T06:43Z 20.1K followers, 1072 engagements

"FortiGuard Labs has reported new Symbiote and BPFdoor variants using eBPF filters to enhance stealth via IPv6 support UDP traffic and dynamic port hopping for covert C2 communication. #CyberSecurity #Malware"
X Link 2025-12-03T00:13Z 20.1K followers, 2375 engagements

"Threat actors are reportedly exploiting CVE-2025-3248 to deliver the Flodrix Botnet targeting AI verticals and linked to the LeetHozer family. #CyberSecurity #FlodrixBotnet"
X Link 2025-06-28T07:48Z 20.1K followers, XXX engagements

"Amazon's threat intelligence team has uncovered an advanced threat actor exploiting zero-days in Cisco and Citrix systems highlighting a worrying trend of attacks on critical identity and network access infrastructure. #Cybersecurity #ZeroDay"
X Link 2025-11-13T00:28Z 20.1K followers, 2860 engagements

"The Splunk Threat Research Team highlights the NotDoor Outlook-macro backdoor linked to APT28 offering insights on detection methods to enhance security coverage. #CyberSecurity #APT28"
X Link 2025-11-15T15:53Z 20.1K followers, 5044 engagements

"An analysis reveals "Hide Me Again" an updated .NET steganography loader delivering Lokibot malware focusing on evasion techniques MITRE ATT&CK TTPs and Splunk detections for improved threat identification. #CyberSecurity #Malware"
X Link 2025-11-16T03:18Z 20.1K followers, 2421 engagements

"Zscaler Threat Hunting reports a sophisticated multi-stage attack by the Water Gamayun APT group exploiting a Windows vulnerability to deliver hidden PowerShell payloads through compromised sites and deceptive file extensions. #CyberSecurity #ThreatHunt"
X Link 2025-11-26T01:26Z 20.1K followers, 4994 engagements

"Zscaler ThreatLabz reports that Matanbuchus XXX a C++ downloader linked to ransomware features advanced obfuscation and persistence methods evolving since its 2020 debut to evade detection and deploy payloads effectively. #CyberSecurity #Malware"
X Link 2025-12-03T06:28Z 20.1K followers, 1617 engagements

"FortiGuard Labs reported that UDPGangster campaigns linked to MuddyWater are using macro-laden phishing lures and UDP backdoors to target multiple countries with advanced evasion techniques. #cybersecurity #malware"
X Link 2025-12-04T14:23Z 20.1K followers, 2365 engagements

"CrowdStrike reports that the sophisticated China-nexus adversary WARP PANDA has been targeting U.S. VMware vCenter environments with BRICKSTORM malware employing advanced OPSEC and new implants Junction and GuestConduit for persistent access. #Cybersecu"
X Link 2025-12-05T04:53Z 20.1K followers, 3306 engagements

"A recent article explores Castle RAT malware's techniques and tactics urging readers to build Splunk detections using MITRE ATT&CK to safeguard their networks against this advanced threat. #CyberSecurity #Malware"
X Link 2025-12-05T05:13Z 20.1K followers, XXX engagements

"CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities catalog following a hacktivist attack on ScadaBR highlighting urgent security concerns in industrial control systems. #CyberSecurity #CISA"
X Link 2025-12-02T02:43Z 20.1K followers, 1161 engagements

"A recent investigation revealed that K7 Antivirus has a significant privilege escalation vulnerability (CVE-2024-36424) due to named pipe abuse and registry manipulation allowing unprivileged users to alter critical settings. #Cybersecurity #Vulnerability"
X Link 2025-12-03T00:13Z 20.1K followers, 1196 engagements

"DNS has unveiled the infrastructure behind ongoing SSO attacks targeting XX U.S. universities where Evilginx phishing tactics evade detection and compromise student credentials highlighting the need for preemptive defensive measures. #CyberSecurity"
X Link 2025-12-02T02:19Z 20.1K followers, 1006 engagements

"Cato CTRL reveals that Claude Skills can be weaponized to execute ransomware like MedusaLocker exposing a consent gap where hidden operations can occur without user awareness posing a significant risk to enterprises. #CyberSecurity #Ransomware"
X Link 2025-12-03T00:13Z 20.1K followers, 1112 engagements

"CISA NSA and the Canadian Cyber Centre warn that PRC state-sponsored hackers are employing a stealthy Go-based backdoor BRICKSTORM for long-term espionage against VMware systems in government and IT networks. #CyberSecurity #Malware"
X Link 2025-12-07T15:13Z 20.1K followers, 2260 engagements

"Recent monitoring by XXX Threat Research Institute reveals that the Gamaredon group is leveraging CVE-2025-8088 to conduct spear-phishing attacks against Ukrainian government entities emphasizing the need for enhanced security measures. #CyberSecurity"
X Link 2025-12-06T01:03Z 20.1K followers, 1002 engagements

"Amazon threat intelligence reports that China-nexus cyber threat groups including Earth Lamia and Jackpot Panda are rapidly exploiting the React2Shell vulnerability (CVE-2025-55182) with a CVSS score of XXXX urging immediate action for affected users"
X Link 2025-12-06T01:43Z 20.1K followers, 1407 engagements

"CyberProof researchers report a resurgence of the Oyster backdoor utilizing SEO poisoning to deliver malicious software disguised as Microsoft Teams and Google Meet files with ties to ransomware groups expected to persist through 2026. #CyberSecurity"
X Link 2025-12-09T12:58Z 20.1K followers, XXX engagements

"Cisco Talos has identified a new loader behind the DeadLock ransomware attack utilizing a BYOVD technique to exploit a Baidu Antivirus driver vulnerability disable security services and implement a sophisticated encryption process. #ransomware #cybers"
X Link 2025-12-09T13:13Z 20.1K followers, 1686 engagements

@Cyber_O51NT
/creator/twitter::Cyber_O51NT