Dark | Light
# ![@papa_anniekey Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::171305529.png) @papa_anniekey hiro_

hiro_ posts on X about splunk, code, memory, pentaho the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

### Engagements: [------] [#](/creator/twitter::171305529/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::171305529/c:line/m:interactions.svg)

- [--] Week [-----] +106%
- [--] Month [-----] +23%
- [--] Months [-----] +165%
- [--] Year [------] +325%

### Mentions: [--] [#](/creator/twitter::171305529/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::171305529/c:line/m:posts_active.svg)


### Followers: [------] [#](/creator/twitter::171305529/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::171305529/c:line/m:followers.svg)

- [--] Week [-----] no change
- [--] Month [-----] +0.20%
- [--] Months [-----] +6.20%
- [--] Year [-----] +12%

### CreatorRank: [---------] [#](/creator/twitter::171305529/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::171305529/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  [currencies](/list/currencies)  [stocks](/list/stocks)  [countries](/list/countries)  [social networks](/list/social-networks) 

**Social topic influence**
[splunk](/topic/splunk), [code](/topic/code), [memory](/topic/memory), [pentaho](/topic/pentaho), [business](/topic/business), [hosted](/topic/hosted), [has been](/topic/has-been), [$9433t](/topic/$9433t), [shell](/topic/shell), [ibm](/topic/ibm)

**Top assets mentioned**
[IBM (IBM)](/topic/ibm) [Fortinet Inc (FTNT)](/topic/fortinet) [Zscaler Inc (ZS)](/topic/$zs)
### Top Social Posts
Top posts by engagements in the last [--] hours

"#EPSS # WhatsUp GoldCVE-2024-4885KEV33"  
[X Link](https://x.com/papa_anniekey/status/1897219212269248717)  2025-03-05T09:34Z [----] followers, [---] engagements


"Vantara Pentaho Business Analytics ServerCVE-2022-43769EPSS=95 #EPSS #"  
[X Link](https://x.com/papa_anniekey/status/1897220084931977548)  2025-03-05T09:38Z [----] followers, [---] engagements


"Malware #Emotet MalDoc hosted in #Japan(KDDI) hxxp://howart.oroit.com/Nov2018/En_us/Open-invoices 106.186.19.187 KDDI CORPORATION This host has been compromised maybe. #Emotet hxxp://lionhomesystem.hu/MSXfps/ #Emotet #polymorphic (.next) https://www.virustotal.com/en/file/94181bd674dbbf056478afebb1f580da448cf3239c742c21edad4070866bcd8d/analysis/ https://www.virustotal.com/en/file/94181bd674dbbf056478afebb1f580da448cf3239c742c21edad4070866bcd8d/analysis/"  
[X Link](https://x.com/papa_anniekey/status/1060106174043893761)  2018-11-07T09:46Z [----] followers, [--] engagements


"Hi @BootstrapMade Let me know. Your distributed Nice Admin(Free Ver) contains. like Backdoor file. Is it intentional or unintentional I worry about it that you are hacked. #bootstrap #backdoor #AnoaGhost Shell File Manager"  
[X Link](https://x.com/papa_anniekey/status/1087627054672039937)  2019-01-22T08:24Z [----] followers, [--] engagements


"@BootstrapMade http://niceadmin.zip http://niceadmin.zip"  
[X Link](https://x.com/papa_anniekey/status/1087627056861466624)  2019-01-22T08:24Z [----] followers, [--] engagements


"@BootstrapMade"  
[X Link](https://x.com/papa_anniekey/status/1087635554106101760)  2019-01-22T08:58Z [----] followers, [--] engagements


"CVE-2019-6340 https://github.com/knqyf263/CVE-2019-6340 https://github.com/knqyf263/CVE-2019-6340"  
[X Link](https://x.com/papa_anniekey/status/1100197809263800322)  2019-02-26T00:56Z [----] followers, [--] engagements


"#Splunk #SIGMA"  
[X Link](https://x.com/papa_anniekey/status/1658665930778615808)  2023-05-17T02:49Z [----] followers, [--] engagements


"#Splunk #Sigma #SPL"  
[X Link](https://x.com/papa_anniekey/status/1661662320161062913)  2023-05-25T09:15Z [----] followers, [--] engagements


"#Phishing Splunk"  
[X Link](https://x.com/papa_anniekey/status/1679039001863540736)  2023-07-12T08:04Z [----] followers, [--] engagements


"#Splunk Splunk Certified Cybersecurity Defense Analyst"  
[X Link](https://x.com/papa_anniekey/status/1692399035875983658)  2023-08-18T04:52Z [----] followers, [--] engagements


"#Splunk SOC"  
[X Link](https://x.com/papa_anniekey/status/1692409291465277637)  2023-08-18T05:33Z [----] followers, [--] engagements


"#Splunk AppsSecurity EssentialsAPPDetectionAppyo"  
[X Link](https://x.com/papa_anniekey/status/1693457802491212178)  2023-08-21T02:59Z [----] followers, [--] engagements


"VTSeverity Virustotal #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1699280255801008408)  2023-09-06T04:35Z [----] followers, [--] engagements


"MS #Splunk =CVE ID"CVE-ID""  
[X Link](https://x.com/papa_anniekey/status/1701825130283032789)  2023-09-13T05:08Z [----] followers, [--] engagements


"#Splunk SysmonTree"  
[X Link](https://x.com/papa_anniekey/status/1703567072465399938)  2023-09-18T00:30Z [----] followers, [--] engagements


"#RDP #honeypot Windows Event LogUFSplunkAdministratorBruteforce"  
[X Link](https://x.com/papa_anniekey/status/1704790740164051306)  2023-09-21T09:32Z [----] followers, [--] engagements


"Hi splunk being sold to cisco how are wwww"  
[X Link](https://x.com/papa_anniekey/status/1705054855113699764)  2023-09-22T03:02Z [----] followers, [--] engagements


"SplunkSentinel Onedue diligenceEDR"  
[X Link](https://x.com/papa_anniekey/status/1705062051524268294)  2023-09-22T03:30Z [----] followers, [--] engagements


"@r1ngo5656 makeresults eval desc="WS" eval table desc url"  
[X Link](https://x.com/papa_anniekey/status/1714207664014840136)  2023-10-17T09:12Z [----] followers, [---] engagements


"Cisco IOS XECVE-2023-20198 IOS XE RT( ip http server ip http access-classACL"  
[X Link](https://x.com/papa_anniekey/status/1714256634153963711)  2023-10-17T12:26Z [----] followers, 44.5K engagements


"Cisco IOS XE #Splunk datamodelweb"  
[X Link](https://x.com/papa_anniekey/status/1715224822941380876)  2023-10-20T04:33Z [----] followers, [----] engagements


"#Splunk # SVD-2023-1104RCE"  
[X Link](https://x.com/papa_anniekey/status/1725394577451078054)  2023-11-17T06:04Z [----] followers, [---] engagements


"@EurekaBerry Lorz MS"  
[X Link](https://x.com/papa_anniekey/status/1729842834298077191)  2023-11-29T12:40Z [----] followers, [--] engagements


"#Splunk SplunkSentinelQRader"  
[X Link](https://x.com/papa_anniekey/status/1732935790207115411)  2023-12-08T01:31Z [----] followers, [---] engagements


"#PIST6 πŸ’¦ #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1733810352951787734)  2023-12-10T11:26Z [----] followers, [---] engagements


"SplunkconfigChatGPTSplunkconfig config"  
[X Link](https://x.com/papa_anniekey/status/1740157689047736415)  2023-12-27T23:48Z [----] followers, [---] engagements


"LLMSplunkSplunkBloom filter"  
[X Link](https://x.com/papa_anniekey/status/1740181250386866346)  2023-12-28T01:21Z [----] followers, [---] engagements


"BroadcomSymantec [--]    2"  
[X Link](https://x.com/papa_anniekey/status/1740716169877995656)  2023-12-29T12:47Z [----] followers, [---] engagements


"SplunkSplunkDMA"  
[X Link](https://x.com/papa_anniekey/status/1742731271183450469)  2024-01-04T02:14Z [----] followers, [---] engagements


"Continuous Search"  
[X Link](https://x.com/anyuser/status/1742732500538097973)  2024-01-04T02:19Z [--] followers, [---] engagements


"@yskmerlion VTC2"  
[X Link](https://x.com/anyuser/status/1743220578721620215)  2024-01-05T10:39Z [--] followers, [--] engagements


"@tomo_20050111 EDR2016"  
[X Link](https://x.com/anyuser/status/1744633464148901966)  2024-01-09T08:13Z [--] followers, [--] engagements


"#Splunk Security Advisory"  
[X Link](https://x.com/anyuser/status/1745613087888298111)  2024-01-12T01:06Z [--] followers, [---] engagements


"SplunkSIEMEnterprise Security(DoS)Splunk"Investigation" Advisory SIEMSplunk ES (Security NEXT) - https://t.co/D0pswoXnL1 SIEMSplunk ES (Security NEXT) - https://t.co/D0pswoXnL1"  
[X Link](https://x.com/anyuser/status/1746701069282070690)  2024-01-15T01:09Z [--] followers, [---] engagements


"#splunk πŸ’¦LM"  
[X Link](https://x.com/papa_anniekey/status/1747903158259687710)  2024-01-18T08:46Z [----] followers, [---] engagements


"#Splunk rootW"  
[X Link](https://x.com/papa_anniekey/status/1747977322698084581)  2024-01-18T13:40Z [----] followers, [---] engagements


"@lllllO_Olllll IBM"  
[X Link](https://x.com/papa_anniekey/status/1748565071784210654)  2024-01-20T04:36Z [----] followers, [--] engagements


"#Splunk Enterprise πŸ’¦"  
[X Link](https://x.com/papa_anniekey/status/1749797996559306756)  2024-01-23T14:15Z [----] followers, [--] engagements


"SplunkblogπŸ’¦πŸ’¦"  
[X Link](https://x.com/anyuser/status/1749810967305977964)  2024-01-23T15:06Z [--] followers, [--] engagements


"blogSplunk3 Splunk() #Splunk"  
[X Link](https://x.com/anyuser/status/1750181663030771764)  2024-01-24T15:39Z [--] followers, [--] engagements


"2SplunkπŸ’¦ Splunk() #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1750182759770046900)  2024-01-24T15:44Z [----] followers, [--] engagements


"3() Splunk() #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1750182761506455768)  2024-01-24T15:44Z [----] followers, [--] engagements


"#Splunk Add-on builder Splunkadd-onSecurity Advisory"  
[X Link](https://x.com/papa_anniekey/status/1752683305005379794)  2024-01-31T13:20Z [----] followers, [--] engagements


"DLLSIEMSplunk EDR"  
[X Link](https://x.com/papa_anniekey/status/1752905738111111513)  2024-02-01T04:04Z [----] followers, [--] engagements


"#Splunk Add-on builderAppAPISplunk"  
[X Link](https://x.com/papa_anniekey/status/1752907709538767062)  2024-02-01T04:12Z [----] followers, [--] engagements


"FbStealerMalware"  
[X Link](https://x.com/papa_anniekey/status/1754106786012148196)  2024-02-04T11:37Z [----] followers, [--] engagements


"@tomo_20050111 MITM()"  
[X Link](https://x.com/papa_anniekey/status/1754378018376863963)  2024-02-05T05:34Z [----] followers, [--] engagements


"FortinetFortiOSCVE-2024-21762 @jpcert"  
[X Link](https://x.com/papa_anniekey/status/1755871932392878384)  2024-02-09T08:31Z [----] followers, [--] engagements


"twitterDJ()DJDJ Deep"  
[X Link](https://x.com/papa_anniekey/status/1757705685666779389)  2024-02-14T09:57Z [----] followers, [--] engagements


"Splunk OTXindicator"  
[X Link](https://x.com/papa_anniekey/status/1758312880892772795)  2024-02-16T02:10Z [----] followers, [--] engagements


"Found this useful link for you. #splunk"  
[X Link](https://x.com/papa_anniekey/status/1758603608915165580)  2024-02-16T21:25Z [----] followers, [---] engagements


"SplunkWorkflow ActionMispOTXPOSTIOCKVPOSTJSON"  
[X Link](https://x.com/papa_anniekey/status/1758607493398442124)  2024-02-16T21:41Z [----] followers, [--] engagements


"@beer_nomu_nomu ASBGP"  
[X Link](https://x.com/papa_anniekey/status/1762605092723949707)  2024-02-27T22:26Z [----] followers, [--] engagements


"@s_torian_ IBMThinkpadLenovoThinkpad"  
[X Link](https://x.com/papa_anniekey/status/1772441545225953699)  2024-03-26T01:52Z [----] followers, [--] engagements


"PCAP #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1775726791573008622)  2024-04-04T03:27Z [----] followers, [--] engagements


"SplunkGMO GOJAS Meetup-22SplunkVol.7 NTT DATASplunk -  #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1777868833157792207)  2024-04-10T01:18Z [----] followers, [--] engagements


"NECSplunkCTFBoss Of The SOCNEC1 BOTS Doorkeeper#GOJAS"  
[X Link](https://x.com/papa_anniekey/status/1777868835699474551)  2024-04-10T01:18Z [----] followers, [--] engagements


"GMO() #Splunk #GOJAS"  
[X Link](https://x.com/papa_anniekey/status/1777888215049138236)  2024-04-10T02:35Z [----] followers, [--] engagements


"GOJAS LT #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1777891740541972511)  2024-04-10T02:49Z [----] followers, [--] engagements


"Splunk #gojas_jp 130(10)  #gojas_jp"  
[X Link](https://x.com/papa_anniekey/status/1778258049997881403)  2024-04-11T03:05Z [----] followers, [--] engagements


"8142 Splunk ( #gojas_jp"  
[X Link](https://x.com/papa_anniekey/status/1778347058455580733)  2024-04-11T08:59Z [----] followers, [--] engagements


"@yoshifin JAMF"  
[X Link](https://x.com/papa_anniekey/status/1778976113206886778)  2024-04-13T02:38Z [----] followers, [--] engagements


"(SplunkFortigateAdd-onCisco)"  
[X Link](https://x.com/papa_anniekey/status/1788126864118321355)  2024-05-08T08:40Z [----] followers, [--] engagements


"@RecordedFuture #Splunk Recorded FutureCTIWebIntlAPIIOCSplunk #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1790587583166337304)  2024-05-15T03:38Z [----] followers, [--] engagements


"#Splunk APP(API)SplunkRf"  
[X Link](https://x.com/papa_anniekey/status/1790587587478094294)  2024-05-15T03:38Z [----] followers, [--] engagements


"IOCAPPIPS(UTM)+#Splunk ESSIEMIOCRiskBaseAlert"  
[X Link](https://x.com/papa_anniekey/status/1790590945043567041)  2024-05-15T03:52Z [----] followers, [--] engagements


"RecordedFutureIOCRF"  
[X Link](https://x.com/papa_anniekey/status/1790590947711234533)  2024-05-15T03:52Z [----] followers, [--] engagements


"ThreatHunt/IOCAd-hocMirai #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1790590949850312751)  2024-05-15T03:52Z [----] followers, [--] engagements


"ThreatHuntXLoader #Splunk MalediaSOC"  
[X Link](https://x.com/papa_anniekey/status/1790592323694518768)  2024-05-15T03:57Z [----] followers, [--] engagements


"Recorded FutureSigma RuleSPLGUISigma #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1790593314254954895)  2024-05-15T04:01Z [----] followers, [--] engagements


"#Splunk ESWorkflow ActionIP(IOC)"  
[X Link](https://x.com/papa_anniekey/status/1790595283543552406)  2024-05-15T04:09Z [----] followers, [--] engagements


"SplunkCisco Security Cloud"  
[X Link](https://x.com/papa_anniekey/status/1790649552820937196)  2024-05-15T07:44Z [----] followers, [--] engagements


"Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information Disclosure https://support.checkpoint.com/results/sk/sk182336 https://support.checkpoint.com/results/sk/sk182336"  
[X Link](https://x.com/papa_anniekey/status/1795975119866634515)  2024-05-30T00:26Z [----] followers, [---] engagements


"UK #phishing"  
[X Link](https://x.com/papa_anniekey/status/1799029339222360163)  2024-06-07T10:43Z [----] followers, [--] engagements


"@NaomiSuzuki_"  
[X Link](https://x.com/papa_anniekey/status/1799095569908142135)  2024-06-07T15:06Z [----] followers, [---] engagements


"SOC #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1801176383357641018)  2024-06-13T08:54Z [----] followers, [--] engagements


"Dashboard Studio SOC πŸ’¦ #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1801272445657341983)  2024-06-13T15:16Z [----] followers, [--] engagements


"= #Splunk SPL"  
[X Link](https://x.com/papa_anniekey/status/1801613946740478398)  2024-06-14T13:53Z [----] followers, [--] engagements


"FortiFirewallSplunkCIMsubtype=local"  
[X Link](https://x.com/papa_anniekey/status/1801630821247554021)  2024-06-14T15:00Z [----] followers, [--] engagements


"Fortigate [-----] Fortinet devices breached by Chinese hackers reboots firmware updates no defence"  
[X Link](https://x.com/papa_anniekey/status/1803712308146999722)  2024-06-20T08:51Z [----] followers, [--] engagements


"JA3NDRDetect"  
[X Link](https://x.com/papa_anniekey/status/1803714173647687921)  2024-06-20T08:59Z [----] followers, [--] engagements


"memo SplunkZeekJA3 https://conf.splunk.com/files/2019/slides/SEC2056.pdf https://conf.splunk.com/files/2019/slides/SEC2056.pdf"  
[X Link](https://x.com/papa_anniekey/status/1803726167746474061)  2024-06-20T09:46Z [----] followers, [---] engagements


"#Splunk Enterprise SecurityVirustotalspl"  
[X Link](https://x.com/papa_anniekey/status/1803975375699218674)  2024-06-21T02:17Z [----] followers, [--] engagements


"Splunk Forwarder"  
[X Link](https://x.com/papa_anniekey/status/1807548366328672346)  2024-06-30T22:54Z [----] followers, [--] engagements


"#Splunk Found this useful link for you. #splunk #regreSSHion"  
[X Link](https://x.com/papa_anniekey/status/1808437705958920627)  2024-07-03T09:48Z [----] followers, [--] engagements


"#Splunk  Splunk 1"  
[X Link](https://x.com/papa_anniekey/status/1808718631993553066)  2024-07-04T04:25Z [----] followers, [--] engagements


"Splunk #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1815392699727614221)  2024-07-22T14:25Z [----] followers, [--] engagements


"crowdstrikecensys (names:crowdstrike* AND not AND parsed.validity_period.not_before= 2024-07-19"  
[X Link](https://x.com/papa_anniekey/status/1815635490009497787)  2024-07-23T06:30Z [----] followers, [--] engagements


"CVE-2024-37085 #Splunk netsysmon"  
[X Link](https://x.com/papa_anniekey/status/1818939093486813378)  2024-08-01T09:17Z [----] followers, [--] engagements


"#EPSS [--] #Splunk"  
[X Link](https://x.com/papa_anniekey/status/1842431922531942744)  2024-10-05T05:09Z [----] followers, [--] engagements


"Webshell Found this useful link for you. #splunk"  
[X Link](https://x.com/papa_anniekey/status/1844201472042635375)  2024-10-10T02:21Z [----] followers, [--] engagements


"KEVCVE-2024-23113EPSS https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog"  
[X Link](https://x.com/papa_anniekey/status/1844604785657569587)  2024-10-11T05:03Z [----] followers, [---] engagements


"Splunk - #splunk"  
[X Link](https://x.com/papa_anniekey/status/1850776492961333376)  2024-10-28T05:47Z [----] followers, [--] engagements


"#Splunk RMM Remote Monitoring and Management (RMM) Tooling Increasingly an Attackers First Choice Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice https://research.splunk.com/stories/remote_monitoring_and_management_software/"  
[X Link](https://x.com/papa_anniekey/status/1900049873296408773)  2025-03-13T05:02Z [----] followers, [---] engagements


"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/risk-based-alerting-splunk-sequenced-events.html https://www.splunk.com/en_us/blog/security/risk-based-alerting-splunk-sequenced-events.html"  
[X Link](https://x.com/papa_anniekey/status/1920712527589015692)  2025-05-09T05:28Z [----] followers, [---] engagements


"( ✨ Red Canary βž• @zscaler Today we are announcing Zscalers agreement to acquire Red Canary. Its a major milestone in our journey. This is a significant step forward in our mission to improve security operations not just for our customers but for the entire cybersecurity https://t.co/JQZvihZljV ✨ Red Canary βž• @zscaler Today we are announcing Zscalers agreement to acquire Red Canary. Its a major milestone in our journey. This is a significant step forward in our mission to improve security operations not just for our customers but for the entire cybersecurity https://t.co/JQZvihZljV"  
[X Link](https://x.com/papa_anniekey/status/1927505066329616545)  2025-05-27T23:19Z [----] followers, [----] engagements


"@anyrun_app I also want to you say "Thank you"😁. I have been tried to catch an activity which use RMM software with Splunk. In this our activity your report is very useful for us. https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://github.com/splunk/security_content/blob/develop/lookups/remote_access_software.csv https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://github.com/splunk/security_content/blob/develop/lookups/remote_access_software.csv"  
[X Link](https://x.com/papa_anniekey/status/1940662599760367970)  2025-07-03T06:43Z [----] followers, [---] engagements


"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/inno-setup-malware-redline-stealer-campaign.html https://www.splunk.com/en_us/blog/security/inno-setup-malware-redline-stealer-campaign.html"  
[X Link](https://x.com/papa_anniekey/status/1943587351709556928)  2025-07-11T08:25Z [----] followers, [---] engagements


"memo cloudflare.blazing-cloud.com/mac/verify/captcha/gr89c4ycyxjq"  
[X Link](https://x.com/papa_anniekey/status/1947169626615693521)  2025-07-21T05:39Z [----] followers, [---] engagements


"#Splunk #SecurityContents #CVE202553770"  
[X Link](https://x.com/papa_anniekey/status/1947470691584147863)  2025-07-22T01:36Z [----] followers, [--] engagements


"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/unveiling-fake-captcha-clickfix-attacks.html https://www.splunk.com/en_us/blog/security/unveiling-fake-captcha-clickfix-attacks.html"  
[X Link](https://x.com/papa_anniekey/status/1948581159094681808)  2025-07-25T03:08Z [----] followers, [---] engagements


"https://lantern.splunk.com/Splunk_Platform/Product_Tips/Artificial_Intelligence_and_Machine_Learning/Leveraging_Splunk_MCP_and_AI_for_enhanced_IT_operations_and_security_investigations https://lantern.splunk.com/Splunk_Platform/Product_Tips/Artificial_Intelligence_and_Machine_Learning/Leveraging_Splunk_MCP_and_AI_for_enhanced_IT_operations_and_security_investigations"  
[X Link](https://x.com/papa_anniekey/status/1952203361182503088)  2025-08-04T03:02Z [----] followers, [---] engagements


"memomemo https://securityonline.info/rapid7-details-cisco-asa-zero-day-exploit-chain-cve-2025-20362-cve-2025-20333/ https://securityonline.info/rapid7-details-cisco-asa-zero-day-exploit-chain-cve-2025-20362-cve-2025-20333/"  
[X Link](https://x.com/papa_anniekey/status/1980798267295469888)  2025-10-22T00:48Z [----] followers, [---] engagements


"Responding to CVE-2025-55182: Secure your React and Next.js workloads @googlecloud https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182 https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182"  
[X Link](https://x.com/papa_anniekey/status/1996418953170849991)  2025-12-04T03:19Z [----] followers, [---] engagements


"https://dashboard.shadowserver.org/statistics/combined/tree/date_range=1&source=http_vulnerable&source=http_vulnerable6&tag=cve-2025-55182%2B&data_set=count&scale=log&auto_update=on https://dashboard.shadowserver.org/statistics/combined/tree/date_range=1&source=http_vulnerable&source=http_vulnerable6&tag=cve-2025-55182%2B&data_set=count&scale=log&auto_update=on"  
[X Link](https://x.com/papa_anniekey/status/1998914587337568636)  2025-12-11T00:35Z [----] followers, [---] engagements


"Cisco Secure Firewall - React Server Components RCE Attempt Cisco Secure FirewallFTDSnortreact2shell Signature https://research.splunk.com/network/d36459b1-7901-401a-a67e-44426c15b168/ https://research.splunk.com/network/d36459b1-7901-401a-a67e-44426c15b168/"  
[X Link](https://x.com/papa_anniekey/status/1999072199173689815)  2025-12-11T11:02Z [----] followers, [---] engagements


"How the Yakuza Took Control of PRIDE FC United Gangs of America https://youtu.be/nNwrx6-bquY https://youtu.be/nNwrx6-bquY"  
[X Link](https://x.com/papa_anniekey/status/2007252461942387047)  2026-01-03T00:47Z [----] followers, [---] engagements


"Splunk Claude DEMO https://youtu.be/CwMr3HdezmE https://youtu.be/CwMr3HdezmE"  
[X Link](https://x.com/papa_anniekey/status/2008004473785110676)  2026-01-05T02:35Z [----] followers, [----] engagements


"Shai-Hulud Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html"  
[X Link](https://x.com/papa_anniekey/status/2014504234201583746)  2026-01-23T01:03Z [----] followers, [---] engagements


"Using dnslookup command with Splunk to enrich network data @YouTube https://youtu.be/GQcdiL6u-Hg https://youtu.be/GQcdiL6u-Hg"  
[X Link](https://x.com/papa_anniekey/status/2015634256966672797)  2026-01-26T03:53Z [----] followers, [---] engagements


"LLMOllamaOpen WebUIRAG https://share.google/2R7zLJMcvTDpGWH3v https://share.google/2R7zLJMcvTDpGWH3v"  
[X Link](https://x.com/papa_anniekey/status/2018873455199068337)  2026-02-04T02:25Z [----] followers, [---] engagements


"KEV CVE-2019-19006 Sangoma FreePBX CVE-2021-39935 GitLab Community and Enterprise Editions CVE-2025-40551 SolarWinds Web Help Desk CVE-2025-64328 Sangoma FreePBX"  
[X Link](https://x.com/papa_anniekey/status/2018928223795683381)  2026-02-04T06:02Z [----] followers, [---] engagements


"#phishing GenAI(Groq)URL"  
[X Link](https://x.com/papa_anniekey/status/2019597677399535680)  2026-02-06T02:23Z [----] followers, [---] engagements


"Found this useful link for you. #splunk npm https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html"  
[X Link](https://x.com/papa_anniekey/status/2022173112138445084)  2026-02-13T04:56Z [----] followers, [---] engagements


"#Splunk SplunkSplunk 10.2SplunkrootSplunkrootSplunkroot"  
[X Link](https://x.com/papa_anniekey/status/2022227926079750417)  2026-02-13T08:34Z [----] followers, [----] engagements


"#Phishing #Splunk"  
[X Link](https://x.com/papa_anniekey/status/2018917616686112869)  2026-02-04T05:20Z [----] followers, [---] engagements


"SplunkESDIFF"  
[X Link](https://x.com/papa_anniekey/status/2019633292019159341)  2026-02-06T04:44Z [----] followers, [---] engagements


"Splunk collect lookup"  
[X Link](https://x.com/papa_anniekey/status/2020762804555481488)  2026-02-09T07:32Z [----] followers, [----] engagements


"@gui_se solidifybegin-updateend-update 😁"  
[X Link](https://x.com/papa_anniekey/status/2023317876762108328)  2026-02-16T08:45Z [----] followers, [--] engagements


"SIEMSIEM()w SIEM: SIEM SIEM: SIEM https://note.com/hiro_shi_note/n/n92c6a7e82dff https://note.com/hiro_shi_note/n/n7540f60ad43b https://note.com/hiro_shi_note/n/n92c6a7e82dff https://note.com/hiro_shi_note/n/n7540f60ad43b"  
[X Link](https://x.com/anyuser/status/1966424922949034352)  2025-09-12T08:53Z [----] followers, 81.2K engagements


"Explzh - https://forest.watch.impress.co.jp/docs/news/2086189.html https://forest.watch.impress.co.jp/docs/news/2086189.html"  
[X Link](https://x.com/anyuser/status/2023330648757502052)  2026-02-16T09:36Z [----] followers, [---] engagements


"Silverfox Group is actively exploiting CVE-2025-70795 in wild to terminate AV processes. Such driver is not in Windows vulnerable driver blocklist. The updated driver verify if the control code is from a SYSTEM Process but still can be used. Reference: https://bbs.kafan.cn/thread-2288675-1-1.html https://bbs.kafan.cn/thread-2288675-1-1.html"  
[X Link](https://x.com/anyuser/status/2022650902520479988)  2026-02-14T12:35Z [---] followers, 22.5K engagements


"PIST6 [---] πŸ”°250πŸ”° [---] πŸ”₯250πŸ”₯ ✨  https://jcspa.or.jp/cycleclub/2026-0314/ https://jcspa.or.jp/cycleclub/2026-0314/"  
[X Link](https://x.com/anyuser/status/2022611785157881881)  2026-02-14T10:00Z [----] followers, [---] engagements


"✨✨🏨 &πŸ€­πŸšΏπŸ™†β™€πŸš²"  
[X Link](https://x.com/anyuser/status/2022445886987735217)  2026-02-13T23:00Z [--] followers, [---] engagements


"Trellix Solidcore(AC) Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can"  
[X Link](https://x.com/anyuser/status/2022428007881937388)  2026-02-13T21:49Z [----] followers, [----] engagements


"Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can easily implement against this specific technique. In practice the most radical approach would be heavily restricting or completely disabling PowerShell via mechanisms such as GPO. However we all know that this is often operationally challenging for many organizations. #solidcore #bypass #trellix #redteam #pentest"  
[X Link](https://x.com/anyuser/status/2021972682762318315)  2026-02-12T15:40Z [----] followers, [----] engagements


"Roses are red. #ReverseEngineering is tough. IDA Pros 40% OFF this Valentine's season. And thats reason enough. ❀ Use code LOVE40 by February [--] to get your license to the industry's best for 40% less: http://hex-rays.com/license-love http://hex-rays.com/license-love"  
[X Link](https://x.com/anyuser/status/2022328660133331454)  2026-02-13T15:15Z [----] followers, 21.7K engagements


"Malicious browser extensions use [--] "flip-to-clean" tactics to evade bans: 1) scrubbing AI conversation scraping code after public exposure. 2) flipping back to a "clean" update before researchers can act so don't be fooled by a "clean" update. Details at https://bit.ly/3ZzIVkS https://bit.ly/3ZzIVkS"  
[X Link](https://x.com/anyuser/status/2022406009273061441)  2026-02-13T20:22Z 66.4K followers, 11.8K engagements


"RUSITelagram Responding to Russian Sabotage Financing https://www.rusi.org/explore-our-research/publications/insights-papers/responding-russian-sabotage-financing https://www.rusi.org/explore-our-research/publications/insights-papers/responding-russian-sabotage-financing"  
[X Link](https://x.com/anyuser/status/2022084803408036169)  2026-02-12T23:06Z [----] followers, 59.4K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@papa_anniekey Avatar @papa_anniekey hiro_

hiro_ posts on X about splunk, code, memory, pentaho the most. They currently have [------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.

Engagements: [------] #

Engagements Line Chart

  • [--] Week [-----] +106%
  • [--] Month [-----] +23%
  • [--] Months [-----] +165%
  • [--] Year [------] +325%

Mentions: [--] #

Mentions Line Chart

Followers: [------] #

Followers Line Chart

  • [--] Week [-----] no change
  • [--] Month [-----] +0.20%
  • [--] Months [-----] +6.20%
  • [--] Year [-----] +12%

CreatorRank: [---------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands currencies stocks countries social networks

Social topic influence splunk, code, memory, pentaho, business, hosted, has been, $9433t, shell, ibm

Top assets mentioned IBM (IBM) Fortinet Inc (FTNT) Zscaler Inc (ZS)

Top Social Posts

Top posts by engagements in the last [--] hours

"#EPSS # WhatsUp GoldCVE-2024-4885KEV33"
X Link 2025-03-05T09:34Z [----] followers, [---] engagements

"Vantara Pentaho Business Analytics ServerCVE-2022-43769EPSS=95 #EPSS #"
X Link 2025-03-05T09:38Z [----] followers, [---] engagements

"Malware #Emotet MalDoc hosted in #Japan(KDDI) hxxp://howart.oroit.com/Nov2018/En_us/Open-invoices 106.186.19.187 KDDI CORPORATION This host has been compromised maybe. #Emotet hxxp://lionhomesystem.hu/MSXfps/ #Emotet #polymorphic (.next) https://www.virustotal.com/en/file/94181bd674dbbf056478afebb1f580da448cf3239c742c21edad4070866bcd8d/analysis/ https://www.virustotal.com/en/file/94181bd674dbbf056478afebb1f580da448cf3239c742c21edad4070866bcd8d/analysis/"
X Link 2018-11-07T09:46Z [----] followers, [--] engagements

"Hi @BootstrapMade Let me know. Your distributed Nice Admin(Free Ver) contains. like Backdoor file. Is it intentional or unintentional I worry about it that you are hacked. #bootstrap #backdoor #AnoaGhost Shell File Manager"
X Link 2019-01-22T08:24Z [----] followers, [--] engagements

"@BootstrapMade http://niceadmin.zip http://niceadmin.zip"
X Link 2019-01-22T08:24Z [----] followers, [--] engagements

"@BootstrapMade"
X Link 2019-01-22T08:58Z [----] followers, [--] engagements

"CVE-2019-6340 https://github.com/knqyf263/CVE-2019-6340 https://github.com/knqyf263/CVE-2019-6340"
X Link 2019-02-26T00:56Z [----] followers, [--] engagements

"#Splunk #SIGMA"
X Link 2023-05-17T02:49Z [----] followers, [--] engagements

"#Splunk #Sigma #SPL"
X Link 2023-05-25T09:15Z [----] followers, [--] engagements

"#Phishing Splunk"
X Link 2023-07-12T08:04Z [----] followers, [--] engagements

"#Splunk Splunk Certified Cybersecurity Defense Analyst"
X Link 2023-08-18T04:52Z [----] followers, [--] engagements

"#Splunk SOC"
X Link 2023-08-18T05:33Z [----] followers, [--] engagements

"#Splunk AppsSecurity EssentialsAPPDetectionAppyo"
X Link 2023-08-21T02:59Z [----] followers, [--] engagements

"VTSeverity Virustotal #Splunk"
X Link 2023-09-06T04:35Z [----] followers, [--] engagements

"MS #Splunk =CVE ID"CVE-ID""
X Link 2023-09-13T05:08Z [----] followers, [--] engagements

"#Splunk SysmonTree"
X Link 2023-09-18T00:30Z [----] followers, [--] engagements

"#RDP #honeypot Windows Event LogUFSplunkAdministratorBruteforce"
X Link 2023-09-21T09:32Z [----] followers, [--] engagements

"Hi splunk being sold to cisco how are wwww"
X Link 2023-09-22T03:02Z [----] followers, [--] engagements

"SplunkSentinel Onedue diligenceEDR"
X Link 2023-09-22T03:30Z [----] followers, [--] engagements

"@r1ngo5656 makeresults eval desc="WS" eval table desc url"
X Link 2023-10-17T09:12Z [----] followers, [---] engagements

"Cisco IOS XECVE-2023-20198 IOS XE RT( ip http server ip http access-classACL"
X Link 2023-10-17T12:26Z [----] followers, 44.5K engagements

"Cisco IOS XE #Splunk datamodelweb"
X Link 2023-10-20T04:33Z [----] followers, [----] engagements

"#Splunk # SVD-2023-1104RCE"
X Link 2023-11-17T06:04Z [----] followers, [---] engagements

"@EurekaBerry Lorz MS"
X Link 2023-11-29T12:40Z [----] followers, [--] engagements

"#Splunk SplunkSentinelQRader"
X Link 2023-12-08T01:31Z [----] followers, [---] engagements

"#PIST6 πŸ’¦ #Splunk"
X Link 2023-12-10T11:26Z [----] followers, [---] engagements

"SplunkconfigChatGPTSplunkconfig config"
X Link 2023-12-27T23:48Z [----] followers, [---] engagements

"LLMSplunkSplunkBloom filter"
X Link 2023-12-28T01:21Z [----] followers, [---] engagements

"BroadcomSymantec [--] 2"
X Link 2023-12-29T12:47Z [----] followers, [---] engagements

"SplunkSplunkDMA"
X Link 2024-01-04T02:14Z [----] followers, [---] engagements

"Continuous Search"
X Link 2024-01-04T02:19Z [--] followers, [---] engagements

"@yskmerlion VTC2"
X Link 2024-01-05T10:39Z [--] followers, [--] engagements

"@tomo_20050111 EDR2016"
X Link 2024-01-09T08:13Z [--] followers, [--] engagements

"#Splunk Security Advisory"
X Link 2024-01-12T01:06Z [--] followers, [---] engagements

"SplunkSIEMEnterprise Security(DoS)Splunk"Investigation" Advisory SIEMSplunk ES (Security NEXT) - https://t.co/D0pswoXnL1 SIEMSplunk ES (Security NEXT) - https://t.co/D0pswoXnL1"
X Link 2024-01-15T01:09Z [--] followers, [---] engagements

"#splunk πŸ’¦LM"
X Link 2024-01-18T08:46Z [----] followers, [---] engagements

"#Splunk rootW"
X Link 2024-01-18T13:40Z [----] followers, [---] engagements

"@lllllO_Olllll IBM"
X Link 2024-01-20T04:36Z [----] followers, [--] engagements

"#Splunk Enterprise πŸ’¦"
X Link 2024-01-23T14:15Z [----] followers, [--] engagements

"SplunkblogπŸ’¦πŸ’¦"
X Link 2024-01-23T15:06Z [--] followers, [--] engagements

"blogSplunk3 Splunk() #Splunk"
X Link 2024-01-24T15:39Z [--] followers, [--] engagements

"2SplunkπŸ’¦ Splunk() #Splunk"
X Link 2024-01-24T15:44Z [----] followers, [--] engagements

"3() Splunk() #Splunk"
X Link 2024-01-24T15:44Z [----] followers, [--] engagements

"#Splunk Add-on builder Splunkadd-onSecurity Advisory"
X Link 2024-01-31T13:20Z [----] followers, [--] engagements

"DLLSIEMSplunk EDR"
X Link 2024-02-01T04:04Z [----] followers, [--] engagements

"#Splunk Add-on builderAppAPISplunk"
X Link 2024-02-01T04:12Z [----] followers, [--] engagements

"FbStealerMalware"
X Link 2024-02-04T11:37Z [----] followers, [--] engagements

"@tomo_20050111 MITM()"
X Link 2024-02-05T05:34Z [----] followers, [--] engagements

"FortinetFortiOSCVE-2024-21762 @jpcert"
X Link 2024-02-09T08:31Z [----] followers, [--] engagements

"twitterDJ()DJDJ Deep"
X Link 2024-02-14T09:57Z [----] followers, [--] engagements

"Splunk OTXindicator"
X Link 2024-02-16T02:10Z [----] followers, [--] engagements

"Found this useful link for you. #splunk"
X Link 2024-02-16T21:25Z [----] followers, [---] engagements

"SplunkWorkflow ActionMispOTXPOSTIOCKVPOSTJSON"
X Link 2024-02-16T21:41Z [----] followers, [--] engagements

"@beer_nomu_nomu ASBGP"
X Link 2024-02-27T22:26Z [----] followers, [--] engagements

"@s_torian_ IBMThinkpadLenovoThinkpad"
X Link 2024-03-26T01:52Z [----] followers, [--] engagements

"PCAP #Splunk"
X Link 2024-04-04T03:27Z [----] followers, [--] engagements

"SplunkGMO GOJAS Meetup-22SplunkVol.7 NTT DATASplunk - #Splunk"
X Link 2024-04-10T01:18Z [----] followers, [--] engagements

"NECSplunkCTFBoss Of The SOCNEC1 BOTS Doorkeeper#GOJAS"
X Link 2024-04-10T01:18Z [----] followers, [--] engagements

"GMO() #Splunk #GOJAS"
X Link 2024-04-10T02:35Z [----] followers, [--] engagements

"GOJAS LT #Splunk"
X Link 2024-04-10T02:49Z [----] followers, [--] engagements

"Splunk #gojas_jp 130(10) #gojas_jp"
X Link 2024-04-11T03:05Z [----] followers, [--] engagements

"8142 Splunk ( #gojas_jp"
X Link 2024-04-11T08:59Z [----] followers, [--] engagements

"@yoshifin JAMF"
X Link 2024-04-13T02:38Z [----] followers, [--] engagements

"(SplunkFortigateAdd-onCisco)"
X Link 2024-05-08T08:40Z [----] followers, [--] engagements

"@RecordedFuture #Splunk Recorded FutureCTIWebIntlAPIIOCSplunk #Splunk"
X Link 2024-05-15T03:38Z [----] followers, [--] engagements

"#Splunk APP(API)SplunkRf"
X Link 2024-05-15T03:38Z [----] followers, [--] engagements

"IOCAPPIPS(UTM)+#Splunk ESSIEMIOCRiskBaseAlert"
X Link 2024-05-15T03:52Z [----] followers, [--] engagements

"RecordedFutureIOCRF"
X Link 2024-05-15T03:52Z [----] followers, [--] engagements

"ThreatHunt/IOCAd-hocMirai #Splunk"
X Link 2024-05-15T03:52Z [----] followers, [--] engagements

"ThreatHuntXLoader #Splunk MalediaSOC"
X Link 2024-05-15T03:57Z [----] followers, [--] engagements

"Recorded FutureSigma RuleSPLGUISigma #Splunk"
X Link 2024-05-15T04:01Z [----] followers, [--] engagements

"#Splunk ESWorkflow ActionIP(IOC)"
X Link 2024-05-15T04:09Z [----] followers, [--] engagements

"SplunkCisco Security Cloud"
X Link 2024-05-15T07:44Z [----] followers, [--] engagements

"Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information Disclosure https://support.checkpoint.com/results/sk/sk182336 https://support.checkpoint.com/results/sk/sk182336"
X Link 2024-05-30T00:26Z [----] followers, [---] engagements

"UK #phishing"
X Link 2024-06-07T10:43Z [----] followers, [--] engagements

"@NaomiSuzuki_"
X Link 2024-06-07T15:06Z [----] followers, [---] engagements

"SOC #Splunk"
X Link 2024-06-13T08:54Z [----] followers, [--] engagements

"Dashboard Studio SOC πŸ’¦ #Splunk"
X Link 2024-06-13T15:16Z [----] followers, [--] engagements

"= #Splunk SPL"
X Link 2024-06-14T13:53Z [----] followers, [--] engagements

"FortiFirewallSplunkCIMsubtype=local"
X Link 2024-06-14T15:00Z [----] followers, [--] engagements

"Fortigate [-----] Fortinet devices breached by Chinese hackers reboots firmware updates no defence"
X Link 2024-06-20T08:51Z [----] followers, [--] engagements

"JA3NDRDetect"
X Link 2024-06-20T08:59Z [----] followers, [--] engagements

"memo SplunkZeekJA3 https://conf.splunk.com/files/2019/slides/SEC2056.pdf https://conf.splunk.com/files/2019/slides/SEC2056.pdf"
X Link 2024-06-20T09:46Z [----] followers, [---] engagements

"#Splunk Enterprise SecurityVirustotalspl"
X Link 2024-06-21T02:17Z [----] followers, [--] engagements

"Splunk Forwarder"
X Link 2024-06-30T22:54Z [----] followers, [--] engagements

"#Splunk Found this useful link for you. #splunk #regreSSHion"
X Link 2024-07-03T09:48Z [----] followers, [--] engagements

"#Splunk Splunk 1"
X Link 2024-07-04T04:25Z [----] followers, [--] engagements

"Splunk #Splunk"
X Link 2024-07-22T14:25Z [----] followers, [--] engagements

"crowdstrikecensys (names:crowdstrike* AND not AND parsed.validity_period.not_before= 2024-07-19"
X Link 2024-07-23T06:30Z [----] followers, [--] engagements

"CVE-2024-37085 #Splunk netsysmon"
X Link 2024-08-01T09:17Z [----] followers, [--] engagements

"#EPSS [--] #Splunk"
X Link 2024-10-05T05:09Z [----] followers, [--] engagements

"Webshell Found this useful link for you. #splunk"
X Link 2024-10-10T02:21Z [----] followers, [--] engagements

"KEVCVE-2024-23113EPSS https://www.cisa.gov/known-exploited-vulnerabilities-catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
X Link 2024-10-11T05:03Z [----] followers, [---] engagements

"Splunk - #splunk"
X Link 2024-10-28T05:47Z [----] followers, [--] engagements

"#Splunk RMM Remote Monitoring and Management (RMM) Tooling Increasingly an Attackers First Choice Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice https://research.splunk.com/stories/remote_monitoring_and_management_software/"
X Link 2025-03-13T05:02Z [----] followers, [---] engagements

"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/risk-based-alerting-splunk-sequenced-events.html https://www.splunk.com/en_us/blog/security/risk-based-alerting-splunk-sequenced-events.html"
X Link 2025-05-09T05:28Z [----] followers, [---] engagements

"( ✨ Red Canary βž• @zscaler Today we are announcing Zscalers agreement to acquire Red Canary. Its a major milestone in our journey. This is a significant step forward in our mission to improve security operations not just for our customers but for the entire cybersecurity https://t.co/JQZvihZljV ✨ Red Canary βž• @zscaler Today we are announcing Zscalers agreement to acquire Red Canary. Its a major milestone in our journey. This is a significant step forward in our mission to improve security operations not just for our customers but for the entire cybersecurity https://t.co/JQZvihZljV"
X Link 2025-05-27T23:19Z [----] followers, [----] engagements

"@anyrun_app I also want to you say "Thank you"😁. I have been tried to catch an activity which use RMM software with Splunk. In this our activity your report is very useful for us. https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://github.com/splunk/security_content/blob/develop/lookups/remote_access_software.csv https://research.splunk.com/stories/remote_monitoring_and_management_software/ https://github.com/splunk/security_content/blob/develop/lookups/remote_access_software.csv"
X Link 2025-07-03T06:43Z [----] followers, [---] engagements

"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/inno-setup-malware-redline-stealer-campaign.html https://www.splunk.com/en_us/blog/security/inno-setup-malware-redline-stealer-campaign.html"
X Link 2025-07-11T08:25Z [----] followers, [---] engagements

"memo cloudflare.blazing-cloud.com/mac/verify/captcha/gr89c4ycyxjq"
X Link 2025-07-21T05:39Z [----] followers, [---] engagements

"#Splunk #SecurityContents #CVE202553770"
X Link 2025-07-22T01:36Z [----] followers, [--] engagements

"Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/unveiling-fake-captcha-clickfix-attacks.html https://www.splunk.com/en_us/blog/security/unveiling-fake-captcha-clickfix-attacks.html"
X Link 2025-07-25T03:08Z [----] followers, [---] engagements

"https://lantern.splunk.com/Splunk_Platform/Product_Tips/Artificial_Intelligence_and_Machine_Learning/Leveraging_Splunk_MCP_and_AI_for_enhanced_IT_operations_and_security_investigations https://lantern.splunk.com/Splunk_Platform/Product_Tips/Artificial_Intelligence_and_Machine_Learning/Leveraging_Splunk_MCP_and_AI_for_enhanced_IT_operations_and_security_investigations"
X Link 2025-08-04T03:02Z [----] followers, [---] engagements

"memomemo https://securityonline.info/rapid7-details-cisco-asa-zero-day-exploit-chain-cve-2025-20362-cve-2025-20333/ https://securityonline.info/rapid7-details-cisco-asa-zero-day-exploit-chain-cve-2025-20362-cve-2025-20333/"
X Link 2025-10-22T00:48Z [----] followers, [---] engagements

"Responding to CVE-2025-55182: Secure your React and Next.js workloads @googlecloud https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182 https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182"
X Link 2025-12-04T03:19Z [----] followers, [---] engagements

"https://dashboard.shadowserver.org/statistics/combined/tree/date_range=1&source=http_vulnerable&source=http_vulnerable6&tag=cve-2025-55182%2B&data_set=count&scale=log&auto_update=on https://dashboard.shadowserver.org/statistics/combined/tree/date_range=1&source=http_vulnerable&source=http_vulnerable6&tag=cve-2025-55182%2B&data_set=count&scale=log&auto_update=on"
X Link 2025-12-11T00:35Z [----] followers, [---] engagements

"Cisco Secure Firewall - React Server Components RCE Attempt Cisco Secure FirewallFTDSnortreact2shell Signature https://research.splunk.com/network/d36459b1-7901-401a-a67e-44426c15b168/ https://research.splunk.com/network/d36459b1-7901-401a-a67e-44426c15b168/"
X Link 2025-12-11T11:02Z [----] followers, [---] engagements

"How the Yakuza Took Control of PRIDE FC United Gangs of America https://youtu.be/nNwrx6-bquY https://youtu.be/nNwrx6-bquY"
X Link 2026-01-03T00:47Z [----] followers, [---] engagements

"Splunk Claude DEMO https://youtu.be/CwMr3HdezmE https://youtu.be/CwMr3HdezmE"
X Link 2026-01-05T02:35Z [----] followers, [----] engagements

"Shai-Hulud Found this useful link for you. #splunk https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html"
X Link 2026-01-23T01:03Z [----] followers, [---] engagements

"Using dnslookup command with Splunk to enrich network data @YouTube https://youtu.be/GQcdiL6u-Hg https://youtu.be/GQcdiL6u-Hg"
X Link 2026-01-26T03:53Z [----] followers, [---] engagements

"LLMOllamaOpen WebUIRAG https://share.google/2R7zLJMcvTDpGWH3v https://share.google/2R7zLJMcvTDpGWH3v"
X Link 2026-02-04T02:25Z [----] followers, [---] engagements

"KEV CVE-2019-19006 Sangoma FreePBX CVE-2021-39935 GitLab Community and Enterprise Editions CVE-2025-40551 SolarWinds Web Help Desk CVE-2025-64328 Sangoma FreePBX"
X Link 2026-02-04T06:02Z [----] followers, [---] engagements

"#phishing GenAI(Groq)URL"
X Link 2026-02-06T02:23Z [----] followers, [---] engagements

"Found this useful link for you. #splunk npm https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html"
X Link 2026-02-13T04:56Z [----] followers, [---] engagements

"#Splunk SplunkSplunk 10.2SplunkrootSplunkrootSplunkroot"
X Link 2026-02-13T08:34Z [----] followers, [----] engagements

"#Phishing #Splunk"
X Link 2026-02-04T05:20Z [----] followers, [---] engagements

"SplunkESDIFF"
X Link 2026-02-06T04:44Z [----] followers, [---] engagements

"Splunk collect lookup"
X Link 2026-02-09T07:32Z [----] followers, [----] engagements

"@gui_se solidifybegin-updateend-update 😁"
X Link 2026-02-16T08:45Z [----] followers, [--] engagements

"SIEMSIEM()w SIEM: SIEM SIEM: SIEM https://note.com/hiro_shi_note/n/n92c6a7e82dff https://note.com/hiro_shi_note/n/n7540f60ad43b https://note.com/hiro_shi_note/n/n92c6a7e82dff https://note.com/hiro_shi_note/n/n7540f60ad43b"
X Link 2025-09-12T08:53Z [----] followers, 81.2K engagements

"Explzh - https://forest.watch.impress.co.jp/docs/news/2086189.html https://forest.watch.impress.co.jp/docs/news/2086189.html"
X Link 2026-02-16T09:36Z [----] followers, [---] engagements

"Silverfox Group is actively exploiting CVE-2025-70795 in wild to terminate AV processes. Such driver is not in Windows vulnerable driver blocklist. The updated driver verify if the control code is from a SYSTEM Process but still can be used. Reference: https://bbs.kafan.cn/thread-2288675-1-1.html https://bbs.kafan.cn/thread-2288675-1-1.html"
X Link 2026-02-14T12:35Z [---] followers, 22.5K engagements

"PIST6 [---] πŸ”°250πŸ”° [---] πŸ”₯250πŸ”₯ ✨ https://jcspa.or.jp/cycleclub/2026-0314/ https://jcspa.or.jp/cycleclub/2026-0314/"
X Link 2026-02-14T10:00Z [----] followers, [---] engagements

"✨✨🏨 &πŸ€­πŸšΏπŸ™†β™€πŸš²"
X Link 2026-02-13T23:00Z [--] followers, [---] engagements

"Trellix Solidcore(AC) Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can"
X Link 2026-02-13T21:49Z [----] followers, [----] engagements

"Hello everyone Ive shared my recent work demonstrating how the Trellix SolidCore application whitelisting solution can be bypassed by executing an executable directly from memory. At the moment there does not appear to be a clear direct mitigation that organizations can easily implement against this specific technique. In practice the most radical approach would be heavily restricting or completely disabling PowerShell via mechanisms such as GPO. However we all know that this is often operationally challenging for many organizations. #solidcore #bypass #trellix #redteam #pentest"
X Link 2026-02-12T15:40Z [----] followers, [----] engagements

"Roses are red. #ReverseEngineering is tough. IDA Pros 40% OFF this Valentine's season. And thats reason enough. ❀ Use code LOVE40 by February [--] to get your license to the industry's best for 40% less: http://hex-rays.com/license-love http://hex-rays.com/license-love"
X Link 2026-02-13T15:15Z [----] followers, 21.7K engagements

"Malicious browser extensions use [--] "flip-to-clean" tactics to evade bans: 1) scrubbing AI conversation scraping code after public exposure. 2) flipping back to a "clean" update before researchers can act so don't be fooled by a "clean" update. Details at https://bit.ly/3ZzIVkS https://bit.ly/3ZzIVkS"
X Link 2026-02-13T20:22Z 66.4K followers, 11.8K engagements

"RUSITelagram Responding to Russian Sabotage Financing https://www.rusi.org/explore-our-research/publications/insights-papers/responding-russian-sabotage-financing https://www.rusi.org/explore-our-research/publications/insights-papers/responding-russian-sabotage-financing"
X Link 2026-02-12T23:06Z [----] followers, 59.4K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@papa_anniekey
/creator/twitter::papa_anniekey