Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@threatinsight Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1683827598.png) @threatinsight Threat Insight

Threat Insight posts on X about flow, token the most. They currently have XXXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::1683827598/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1683827598/c:line/m:interactions.svg)

- X Month XXXXX -XX%
- X Months XXXXXX -XX%
- X Year XXXXXX -XX%

### Mentions: X [#](/creator/twitter::1683827598/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1683827598/c:line/m:posts_active.svg)

- X Year XX -XX%

### Followers: XXXXXX [#](/creator/twitter::1683827598/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1683827598/c:line/m:followers.svg)

- X Month XXXXXX +0.02%
- X Months XXXXXX +3%
- X Year XXXXXX +6.70%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::1683827598/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1683827598/c:line/m:influencer_rank.svg)

### Social Influence

**Social topic influence**
[flow](/topic/flow) 50%, [token](/topic/token) XX%
### Top Social Posts
Top posts by engagements in the last XX hours

"New research from @threatinsight Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts. ⚠ Successful compromise leads to #accounttakeover #dataexfiltration and more. Blog: Heres what you need to know. 🧵"  
[X Link](https://x.com/threatinsight/status/2001694196785389712)  2025-12-18T16:41Z 11.6K followers, 4414 engagements


"Attack flow: #Socialengineering is used to trick a user into logging into an app w/ legitimate credentials The service generates a device code directing user to input it at MSFTs verification URL The token becomes valid giving threat actor control of the M365 account"  
[X Link](https://x.com/threatinsight/status/2001694198396027288)  2025-12-18T16:41Z 11.6K followers, XXX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@threatinsight Avatar @threatinsight Threat Insight

Threat Insight posts on X about flow, token the most. They currently have XXXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Month XXXXX -XX%
  • X Months XXXXXX -XX%
  • X Year XXXXXX -XX%

Mentions: X #

Mentions Line Chart

  • X Year XX -XX%

Followers: XXXXXX #

Followers Line Chart

  • X Month XXXXXX +0.02%
  • X Months XXXXXX +3%
  • X Year XXXXXX +6.70%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social topic influence flow 50%, token XX%

Top Social Posts

Top posts by engagements in the last XX hours

"New research from @threatinsight Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts. ⚠ Successful compromise leads to #accounttakeover #dataexfiltration and more. Blog: Heres what you need to know. 🧵"
X Link 2025-12-18T16:41Z 11.6K followers, 4414 engagements

"Attack flow: #Socialengineering is used to trick a user into logging into an app w/ legitimate credentials The service generates a device code directing user to input it at MSFTs verification URL The token becomes valid giving threat actor control of the M365 account"
X Link 2025-12-18T16:41Z 11.6K followers, XXX engagements

@threatinsight
/creator/twitter::threatinsight