[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @BSidesNYC #BSidesNYC #BSidesNYC posts on X about crowdstrike, rings, infrastructure, real time the most. They currently have XXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours. ### Engagements: XXX [#](/creator/twitter::1305861288/interactions)  - X Week XXXXX +1,682% - X Months XXXXX +17,782% - X Year XXXXX -XX% ### Mentions: X [#](/creator/twitter::1305861288/posts_active)  - X Week X +350% - X Year XX -XX% ### Followers: XXXXX [#](/creator/twitter::1305861288/followers)  - X Week XXXXX +0.93% - X Months XXXXX +3.80% - X Year XXXXX +10% ### CreatorRank: XXXXXXXXX [#](/creator/twitter::1305861288/influencer_rank)  ### Social Influence [#](/creator/twitter::1305861288/influence) --- **Social category influence** [stocks](/list/stocks) [technology brands](/list/technology-brands) [finance](/list/finance) **Social topic influence** [crowdstrike](/topic/crowdstrike) #12, [rings](/topic/rings), [infrastructure](/topic/infrastructure), [real time](/topic/real-time), [amit](/topic/amit), [life of](/topic/life-of), [underground](/topic/underground), [affiliate](/topic/affiliate), [the only](/topic/the-only), [unlock](/topic/unlock) **Top assets mentioned** [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) ### Top Social Posts [#](/creator/twitter::1305861288/posts) --- Top posts by engagements in the last XX hours "The Log Rings Dont Lie: Historical Enumeration in Plain Sight Bleon Proko Security Engineer shows how attackers can use logs to perform enumeration run C2 channels and exfiltrate data through cloud infrastructure. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979629194918125878) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T19:22Z 2176 followers, XX engagements "P0LR Espresso: Pulling Shots of Cloud Live Response & Advanced Analysis Art Ukshini Threat Researcher at Permiso Security presents P0LR Espresso a tool built to cut through noisy cloud logs detect threats in real time and speed up incident response. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979630572998697208) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T19:28Z 2176 followers, XX engagements "From Interview Questions to Cluster Damage: Adventures in k8s Cluster Hacking presented by Amit Serper Lead Security Researcher at CrowdStrike. The talk highlights Kubernetes vulnerabilities found during testing and offers practical ways to secure cluster setups. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979557957512700308) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T14:39Z 2176 followers, 1085 engagements "Syndicate: The Life of a Ransomware Affiliate Tammy Harper from Flare breaks down the world of ransomware-as-a-service showing how affiliates evolve from small-time operators to full syndicates and what keeps these underground groups running. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979562040998932553) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T14:55Z 2176 followers, XXX engagements "What Its Like Being the Only Security Startup in Your YC Batch SubImage Co-founders Alex Chantavy and Kunaal Sikka share what it was like building a cybersecurity startup in Y Combinators Winter 2025 batch surrounded by AI ventures. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979563078132826541) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T14:59Z 2176 followers, XXX engagements "The Human-AI Handshake: A Framework to Build Trust and Unlock Innovation in Modern Security Ops Michael August Raggi Principal Threat Response Specialist at Crowdstrike shares how AI can build trust boost efficiency and spark innovation in security operations. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979570120230941084) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T15:27Z 2176 followers, XXX engagements "Trust at Scale: Lessons Learned from a Decade of Engineering for Identity Frdric Rivain CTO at Dashlane shares lessons from building secure-by-design systems and scaling trust across millions of users in the evolving world of identity security. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979611376415842672) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T18:11Z 2176 followers, XXX engagements "The Allure of Gos Cross-Platform Capability: A Gateway for Threat Actors to Mac and Linux Anmol Maurya from Palo Alto Networks explains how attackers use Go to target Mac and Linux and what defenders need to know. #BSidesNYC" [X Link](https://x.com/BSidesNYC/status/1979655250773471444) [@BSidesNYC](/creator/x/BSidesNYC) 2025-10-18T21:06Z 2176 followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
#BSidesNYC posts on X about crowdstrike, rings, infrastructure, real time the most. They currently have XXXXX followers and XX posts still getting attention that total XXX engagements in the last XX hours.
Social category influence stocks technology brands finance
Social topic influence crowdstrike #12, rings, infrastructure, real time, amit, life of, underground, affiliate, the only, unlock
Top assets mentioned Crowdstrike Holdings Inc (CRWD)
Top posts by engagements in the last XX hours
"The Log Rings Dont Lie: Historical Enumeration in Plain Sight Bleon Proko Security Engineer shows how attackers can use logs to perform enumeration run C2 channels and exfiltrate data through cloud infrastructure. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T19:22Z 2176 followers, XX engagements
"P0LR Espresso: Pulling Shots of Cloud Live Response & Advanced Analysis Art Ukshini Threat Researcher at Permiso Security presents P0LR Espresso a tool built to cut through noisy cloud logs detect threats in real time and speed up incident response. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T19:28Z 2176 followers, XX engagements
"From Interview Questions to Cluster Damage: Adventures in k8s Cluster Hacking presented by Amit Serper Lead Security Researcher at CrowdStrike. The talk highlights Kubernetes vulnerabilities found during testing and offers practical ways to secure cluster setups. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T14:39Z 2176 followers, 1085 engagements
"Syndicate: The Life of a Ransomware Affiliate Tammy Harper from Flare breaks down the world of ransomware-as-a-service showing how affiliates evolve from small-time operators to full syndicates and what keeps these underground groups running. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T14:55Z 2176 followers, XXX engagements
"What Its Like Being the Only Security Startup in Your YC Batch SubImage Co-founders Alex Chantavy and Kunaal Sikka share what it was like building a cybersecurity startup in Y Combinators Winter 2025 batch surrounded by AI ventures. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T14:59Z 2176 followers, XXX engagements
"The Human-AI Handshake: A Framework to Build Trust and Unlock Innovation in Modern Security Ops Michael August Raggi Principal Threat Response Specialist at Crowdstrike shares how AI can build trust boost efficiency and spark innovation in security operations. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T15:27Z 2176 followers, XXX engagements
"Trust at Scale: Lessons Learned from a Decade of Engineering for Identity Frdric Rivain CTO at Dashlane shares lessons from building secure-by-design systems and scaling trust across millions of users in the evolving world of identity security. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T18:11Z 2176 followers, XXX engagements
"The Allure of Gos Cross-Platform Capability: A Gateway for Threat Actors to Mac and Linux Anmol Maurya from Palo Alto Networks explains how attackers use Go to target Mac and Linux and what defenders need to know. #BSidesNYC"
X Link @BSidesNYC 2025-10-18T21:06Z 2176 followers, XXX engagements
/creator/x::BSidesNYC