[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @anyrun_app ANY.RUN ANY.RUN posts on X about phishing, microsoft, $255c252225222522daterange25221807d, for your the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours. ### Engagements: XXXXX [#](/creator/twitter::833639043862786048/interactions)  - X Week XXXXX -XX% - X Month XXXXXX +213% - X Months XXXXXXX -XX% - X Year XXXXXXX -XX% ### Mentions: X [#](/creator/twitter::833639043862786048/posts_active)  ### Followers: XXXXXX [#](/creator/twitter::833639043862786048/followers)  - X Week XXXXXX +0.21% - X Month XXXXXX +0.88% - X Months XXXXXX +7.30% - X Year XXXXXX +17% ### CreatorRank: XXXXXXX [#](/creator/twitter::833639043862786048/influencer_rank)  ### Social Influence [#](/creator/twitter::833639043862786048/influence) --- **Social category influence** [stocks](/list/stocks) XXXXX% [technology brands](/list/technology-brands) XXXXX% **Social topic influence** [phishing](/topic/phishing) #7, [microsoft](/topic/microsoft) #1895, [$255c252225222522daterange25221807d](/topic/$255c252225222522daterange25221807d) #1, [for your](/topic/for-your) XXXX% **Top accounts mentioned or mentioned by** [@uk_daniel_card](/creator/undefined) [@ngnicky](/creator/undefined) [@cremescene_](/creator/undefined) [@salmanvsf](/creator/undefined) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) ### Top Social Posts [#](/creator/twitter::833639043862786048/posts) --- Top posts by engagements in the last XX hours "🚨 #LOLBin abuse remains one of the hardest techniques for SOC teams to detect. Attackers hijack trusted Windows tools to execute malicious activities while blending into legitimate processes. 👨💻 See example of a typical attack: 📖 Read the breakdown of new #malware tactics: #CybersecurityAwarenessMonth" [X Link](https://x.com/anyrun_app/status/1981299805226746016) [@anyrun_app](/creator/x/anyrun_app) 2025-10-23T10:00Z 30.6K followers, 22.4K engagements "🚨 How #Pxastealer Uses Masquerading: Execution Flow and TTPs. ⚠ Pxastealer is delivered through archive links in #phishing emails bypassing automated filters. Masquerading hides execution and gives attackers time to exfiltrate data. Execution flow & TTPs: X Initial Access (T1566.002): A victim clicks a link to a malicious archive in a spearphishing email. X Execution & Cleanup (T1059.003 T1070.004): cmd.exe runs a long command chain and deletes traces. X Defense Evasion (1036.008 T1140 T1027): A fake Word file opens to mask background activity while certutil -decode turns a fake financial" [X Link](https://x.com/anyrun_app/status/1983537544013721672) [@anyrun_app](/creator/x/anyrun_app) 2025-10-29T14:12Z 30.6K followers, 2419 engagements "#ANYRUN Sandbox & Microsoft Sentinel 🚀 SOCs and MSSPs can now boost threat detection by up to XX% reduce alert overload and cut MTTR by XX minutes. Automate triage and enrich alerts with actionable reports 👇" [X Link](https://x.com/anyrun_app/status/1983111562064724344) [@anyrun_app](/creator/x/anyrun_app) 2025-10-28T10:00Z 30.6K followers, 1067 engagements "Phishing activity in the past X days 🐟 Track latest #phishing threats in TI Lookup: #TopPhishingThreats" [X Link](https://x.com/anyrun_app/status/1985602980154909056) [@anyrun_app](/creator/x/anyrun_app) 2025-11-04T07:00Z 30.6K followers, 2185 engagements "👨💻 Discover everything you need to know about #malware sandboxes. How they work who uses them and how to choose the right one for your team. Full guide and a use case inside:" [X Link](https://x.com/anyrun_app/status/1983888302278119540) [@anyrun_app](/creator/x/anyrun_app) 2025-10-30T13:26Z 30.6K followers, 1144 engagements "Phishing activity in the past X days 🐟 Track latest #phishing threats in TI Lookup: #TopPhishingThreats" [X Link](https://x.com/anyrun_app/status/1983066292950102192) [@anyrun_app](/creator/x/anyrun_app) 2025-10-28T07:00Z 30.6K followers, 1917 engagements "🕵♂ #Tykit phishkit targeting hundreds of US & EU companies exposed. Multi-stage attack uses SVG redirects and /api/validate C2 calls to steal Microsoft XXX creds. Detected and traced in #ANYRUNs sandbox within minutes. Read the full analysis & get IOCs:" [X Link](https://x.com/anyrun_app/status/1984155538951676139) [@anyrun_app](/creator/x/anyrun_app) 2025-10-31T07:08Z 30.6K followers, 6099 engagements "🚨 #Tykit phishing kit is stealing Microsoft XXX credentials using malicious SVG files and bypassing MFA through #AitM attacks. Learn how this #PhaaS works who's being targeted and how to defend your organization:" [X Link](https://x.com/anyrun_app/status/1985285916869452224) [@anyrun_app](/creator/x/anyrun_app) 2025-11-03T10:00Z 30.6K followers, 2045 engagements "⚠ #Tycoon detections surged XX% in Q3 solidifying its position as the most active #phishing kit. Get key insights from #ANYRUNs Malware Trends Report to guide your Q4 strategy:" [X Link](https://x.com/anyrun_app/status/1985648295151046914) [@anyrun_app](/creator/x/anyrun_app) 2025-11-04T10:00Z 30.6K followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@anyrun_app ANY.RUNANY.RUN posts on X about phishing, microsoft, $255c252225222522daterange25221807d, for your the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence stocks XXXXX% technology brands XXXXX%
Social topic influence phishing #7, microsoft #1895, $255c252225222522daterange25221807d #1, for your XXXX%
Top accounts mentioned or mentioned by @uk_daniel_card @ngnicky @cremescene_ @salmanvsf
Top assets mentioned Microsoft Corp. (MSFT)
Top posts by engagements in the last XX hours
"🚨 #LOLBin abuse remains one of the hardest techniques for SOC teams to detect. Attackers hijack trusted Windows tools to execute malicious activities while blending into legitimate processes. 👨💻 See example of a typical attack: 📖 Read the breakdown of new #malware tactics: #CybersecurityAwarenessMonth"
X Link @anyrun_app 2025-10-23T10:00Z 30.6K followers, 22.4K engagements
"🚨 How #Pxastealer Uses Masquerading: Execution Flow and TTPs. ⚠ Pxastealer is delivered through archive links in #phishing emails bypassing automated filters. Masquerading hides execution and gives attackers time to exfiltrate data. Execution flow & TTPs: X Initial Access (T1566.002): A victim clicks a link to a malicious archive in a spearphishing email. X Execution & Cleanup (T1059.003 T1070.004): cmd.exe runs a long command chain and deletes traces. X Defense Evasion (1036.008 T1140 T1027): A fake Word file opens to mask background activity while certutil -decode turns a fake financial"
X Link @anyrun_app 2025-10-29T14:12Z 30.6K followers, 2419 engagements
"#ANYRUN Sandbox & Microsoft Sentinel 🚀 SOCs and MSSPs can now boost threat detection by up to XX% reduce alert overload and cut MTTR by XX minutes. Automate triage and enrich alerts with actionable reports 👇"
X Link @anyrun_app 2025-10-28T10:00Z 30.6K followers, 1067 engagements
"Phishing activity in the past X days 🐟 Track latest #phishing threats in TI Lookup: #TopPhishingThreats"
X Link @anyrun_app 2025-11-04T07:00Z 30.6K followers, 2185 engagements
"👨💻 Discover everything you need to know about #malware sandboxes. How they work who uses them and how to choose the right one for your team. Full guide and a use case inside:"
X Link @anyrun_app 2025-10-30T13:26Z 30.6K followers, 1144 engagements
"Phishing activity in the past X days 🐟 Track latest #phishing threats in TI Lookup: #TopPhishingThreats"
X Link @anyrun_app 2025-10-28T07:00Z 30.6K followers, 1917 engagements
"🕵♂ #Tykit phishkit targeting hundreds of US & EU companies exposed. Multi-stage attack uses SVG redirects and /api/validate C2 calls to steal Microsoft XXX creds. Detected and traced in #ANYRUNs sandbox within minutes. Read the full analysis & get IOCs:"
X Link @anyrun_app 2025-10-31T07:08Z 30.6K followers, 6099 engagements
"🚨 #Tykit phishing kit is stealing Microsoft XXX credentials using malicious SVG files and bypassing MFA through #AitM attacks. Learn how this #PhaaS works who's being targeted and how to defend your organization:"
X Link @anyrun_app 2025-11-03T10:00Z 30.6K followers, 2045 engagements
"⚠ #Tycoon detections surged XX% in Q3 solidifying its position as the most active #phishing kit. Get key insights from #ANYRUNs Malware Trends Report to guide your Q4 strategy:"
X Link @anyrun_app 2025-11-04T10:00Z 30.6K followers, XXX engagements
/creator/twitter::anyrun_app