[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @threatinsight Threat Insight Threat Insight posts on X about flow, token the most. They currently have XXXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours. ### Engagements: XXXXX [#](/creator/twitter::1683827598/interactions)  - X Month XXXXX -XX% - X Months XXXXXX -XX% - X Year XXXXXX -XX% ### Mentions: X [#](/creator/twitter::1683827598/posts_active)  - X Year XX -XX% ### Followers: XXXXXX [#](/creator/twitter::1683827598/followers)  - X Month XXXXXX +0.02% - X Months XXXXXX +3% - X Year XXXXXX +6.70% ### CreatorRank: XXXXXXXXX [#](/creator/twitter::1683827598/influencer_rank)  ### Social Influence **Social topic influence** [flow](/topic/flow) 50%, [token](/topic/token) XX% ### Top Social Posts Top posts by engagements in the last XX hours "New research from @threatinsight Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts. ⚠ Successful compromise leads to #accounttakeover #dataexfiltration and more. Blog: Heres what you need to know. 🧵" [X Link](https://x.com/threatinsight/status/2001694196785389712) 2025-12-18T16:41Z 11.6K followers, 4414 engagements "Attack flow: #Socialengineering is used to trick a user into logging into an app w/ legitimate credentials The service generates a device code directing user to input it at MSFTs verification URL The token becomes valid giving threat actor control of the M365 account" [X Link](https://x.com/threatinsight/status/2001694198396027288) 2025-12-18T16:41Z 11.6K followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@threatinsight Threat InsightThreat Insight posts on X about flow, token the most. They currently have XXXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours.
Social topic influence flow 50%, token XX%
Top posts by engagements in the last XX hours
"New research from @threatinsight Threat actors are using #phishing tactics to trick users into giving access to #M365 accounts. ⚠ Successful compromise leads to #accounttakeover #dataexfiltration and more. Blog: Heres what you need to know. 🧵"
X Link 2025-12-18T16:41Z 11.6K followers, 4414 engagements
"Attack flow: #Socialengineering is used to trick a user into logging into an app w/ legitimate credentials The service generates a device code directing user to input it at MSFTs verification URL The token becomes valid giving threat actor control of the M365 account"
X Link 2025-12-18T16:41Z 11.6K followers, XXX engagements
/creator/twitter::threatinsight