[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @wdormann Will Dormann is on Mastodon Will Dormann is on Mastodon posts on X about vector the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXX engagements in the last XX hours. ### Engagements: XXX [#](/creator/twitter::792754729/interactions)  - X Month XXX -XX% - X Months XXXXXX -XX% - X Year XXXXXXX -XX% ### Mentions: X [#](/creator/twitter::792754729/posts_active)  - X Months XX -XX% - X Year XX -XX% ### Followers: XXXXXX [#](/creator/twitter::792754729/followers)  - X Month XXXXXX +0.06% - X Months XXXXXX +1.50% - X Year XXXXXX +1.10% ### CreatorRank: undefined [#](/creator/twitter::792754729/influencer_rank)  ### Social Influence **Social category influence** [social networks](/list/social-networks) **Social topic influence** [vector](/topic/vector) **Top accounts mentioned or mentioned by** [@mkolsek](/creator/undefined) [@ronnytnl](/creator/undefined) [@malwarejake](/creator/undefined) [@haifeili](/creator/undefined) [@cyb3rops](/creator/undefined) [@malwrhunterteam](/creator/undefined) [@vxunderground](/creator/undefined) [@0patch](/creator/undefined) [@arekfurt](/creator/undefined) [@attritionorg](/creator/undefined) [@awakecoding](/creator/undefined) [@simokohonen](/creator/undefined) [@sixtyvividtails](/creator/undefined) [@richinseattle](/creator/undefined) [@jamiesixworks](/creator/undefined) [@dwizzzlemsft](/creator/undefined) [@cpresearch](/creator/undefined) [@nathanmcnulty](/creator/undefined) [@iancoldwater](/creator/undefined) [@akamairesearch](/creator/undefined) ### Top Social Posts Top posts by engagements in the last XX hours "@akamai_research Very excellent stuff. Though the "Attack vector" section for the chosen CVE is disappointing. No experienced human would write such a thing. The real vector is: Remote attacker crafts a VHD and sends to victim. If victim logged in as admin NTFS filesystem mounts and triggers vul" [X Link](https://x.com/wdormann/status/2000267084446757011) 2025-12-14T18:10Z 26.3K followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@wdormann Will Dormann is on MastodonWill Dormann is on Mastodon posts on X about vector the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXX engagements in the last XX hours.
Social category influence social networks
Social topic influence vector
Top accounts mentioned or mentioned by @mkolsek @ronnytnl @malwarejake @haifeili @cyb3rops @malwrhunterteam @vxunderground @0patch @arekfurt @attritionorg @awakecoding @simokohonen @sixtyvividtails @richinseattle @jamiesixworks @dwizzzlemsft @cpresearch @nathanmcnulty @iancoldwater @akamairesearch
Top posts by engagements in the last XX hours
"@akamai_research Very excellent stuff. Though the "Attack vector" section for the chosen CVE is disappointing. No experienced human would write such a thing. The real vector is: Remote attacker crafts a VHD and sends to victim. If victim logged in as admin NTFS filesystem mounts and triggers vul"
X Link 2025-12-14T18:10Z 26.3K followers, XXX engagements
/creator/twitter::wdormann