Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@TrendMicroRSRCH Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::11927342.png) @TrendMicroRSRCH Trend Micro Research

Trend Micro Research posts on X about $4704t, whatsapp, for your, realtime the most. They currently have XXXXXX followers and 2505 posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::11927342/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::11927342/c:line/m:interactions.svg)

- X Week XXXXXX +104%
- X Month XXXXXX -XX%
- X Months XXXXXXXXXX +197%
- X Year XXXXXXXXXX +29%

### Mentions: XX [#](/creator/twitter::11927342/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::11927342/c:line/m:posts_active.svg)

- X Week XX +53%
- X Month XXX -XX%
- X Months XXXXX +80%
- X Year XXXXX +417%

### Followers: XXXXXX [#](/creator/twitter::11927342/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::11927342/c:line/m:followers.svg)

- X Week XXXXXX -XXXX%
- X Month XXXXXX -XXXX%
- X Months XXXXXX -XXXX%
- X Year XXXXXX -XXXX%

### CreatorRank: XXXXXXX [#](/creator/twitter::11927342/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::11927342/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::11927342/influence)
---

**Social category influence**
[technology brands](/list/technology-brands)  [finance](/list/finance)  [social networks](/list/social-networks)  [travel destinations](/list/travel-destinations)  [cryptocurrencies](/list/cryptocurrencies)  [stocks](/list/stocks) 

**Social topic influence**
[$4704t](/topic/$4704t) #3, [whatsapp](/topic/whatsapp), [for your](/topic/for-your), [realtime](/topic/realtime) #388, [telegram](/topic/telegram), [$6753t](/topic/$6753t), [rival](/topic/rival), [safely](/topic/safely) #1077, [cisco](/topic/cisco) #78, [insurance](/topic/insurance)

**Top assets mentioned**
[Cronos (CRO)](/topic/cronos)
### Top Social Posts [#](/creator/twitter::11927342/posts)
---
Top posts by engagements in the last XX hours

"The Gentlemen ransomware group has targeted multiple industries and regions focusing particularly on sectors such as manufacturing construction healthcare and insurance with attacks spanning at least XX countries. Learn their tactics:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981616651335278935) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T07:00Z 51.8K followers, XXX engagements


"The spike in task scam reports to the FTC suggest that cybercriminals are getting big payouts from these scams. Attackers are using initial small payouts and escalating deposit requests. Learn what a task scam is the modus operandi and how you can safeguard yourself from this threat:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980801276335046667) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T01:00Z 51.8K followers, XXX engagements


"Sensitive personal and financial data leaks from a doxxing campaign have triggered loss of key personnel in Lumma Stealers operation increasing distrust and internal conflict among cybercriminals. Read our full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981918639553978828) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T03:00Z 51.8K followers, XXX engagements


"Phishing campaigns are abusing trusted web builders by hosting fake CAPTCHA pages designed to evade automated scanners and trick users. Learn how attackers bypass security controls and how to defend against these threats:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981948840077861271) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T05:00Z 51.8K followers, XXX engagements


"1/8 Trend Micros latest analysis found that the Chaos ransomware campaign is leveraging advanced anti-EDR techniques. Our telemetry confirms malicious DLL sideloading and kernel-level driver deployment enabling broad defense evasion"  
[X Link](https://x.com/TrendMicroRSRCH/status/1972949541633528089) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-09-30T09:00Z 51.8K followers, 1050 engagements


"5/6 We strongly advise applying Oracles official patch and supplementing with Trend Micros endpoint and network protections. Layered defense is key to minimizing risk"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783424276189496) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.9K followers, XXX engagements


"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976513021959663914) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T05:00Z 51.8K followers, XXX engagements


"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976905607190851648) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-11T07:00Z 51.8K followers, XXX engagements


"When software contains embedded credentials attackers can target the supply chain and manipulate distributed updates. We detail the risks and offer guidance for organizations to secure their software:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977660583563477140) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T09:00Z 51.8K followers, XXX engagements


"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977902175989748093) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-14T01:00Z 51.9K followers, XXX engagements


"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977962570892947491) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-14T05:00Z 51.8K followers, XXX engagements


"Data and model poisoning threaten #AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980204846138425742) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T09:30Z 51.8K followers, XXX engagements


"Organizations with exposed network devices risk data theft and disruption from RondoDoxs shotgun approach. The lifecycle of n-day exploits poses ongoing challenges requiring robust vulnerability management. See our technical breakdown:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980861673813536899) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T05:00Z 51.9K followers, XXX engagements


"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980891876124156369) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T07:00Z 51.9K followers, XXX engagements


"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. Full details:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980997569917374948) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T14:00Z 51.9K followers, XXX engagements


"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981042869977694562) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T17:00Z 51.9K followers, XXX engagements


"AI-assisted code generation now makes it easier to turn public security reports into malware blueprints. The way TTPs are shared and absorbed needs careful consideration to prevent misuse. Proactively secure your knowledge sharing:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981677049392578585) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T11:00Z 51.8K followers, XXX engagements


"Power Automate misuse can result in data exfiltration and covert channels. Discover how attackers use persistent flows and how you can safeguard your systems. Full story here:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981722347846369431) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T14:00Z 51.8K followers, XXX engagements


"Data and model poisoning threaten AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981797843464511876) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T19:00Z 51.8K followers, XXX engagements


"Wondershare RepairIt an AI app embedded cloud credentials in its code exposing user photos and internal assets. Attackers could manipulate files or deliver malicious updates via trusted channels. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982039435974754527) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T11:00Z 51.8K followers, XXX engagements


"SORVEPOTEL malware is spreading via WhatsApp Web by sending unsolicited ZIP files to contacts. Opening these files on a desktop triggers automatic propagation to more users. Learn how to defend against this attack:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976090235059503491) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-09T01:00Z 51.9K followers, XXX engagements


"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976452640167931971) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T01:00Z 51.9K followers, XXX engagements


"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976513022051934664) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T05:00Z 51.9K followers, XXX engagements


"Wondershare RepairIt a popular AI-powered image and video repair app put sensitive user photos at risk by embedding overly permissive cloud access tokens in its code. This security lapse also exposed company AI models software and source code contradicting privacy assurances. Learn how to protect your data and what organizations should do differently:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1976543220348719534) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-10T07:00Z 51.9K followers, XXX engagements


"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977841776007254433) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T21:00Z 51.9K followers, XXX engagements


"Trend Research exposes how attackers use SNMP and Telnet exploits to compromise Cisco switches and deploy rootkits. See how Trend Vision One enables proactive defense:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1978506155048550559) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-15T17:00Z 51.9K followers, 3931 engagements


"Trend Research reveals a targeted campaign utilizing SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980167097486324191) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T07:00Z 51.9K followers, XXX engagements


"Operation Zero Disco shows why patching network hardware is vital. Trend Micro detects and neutralizes these advanced exploits while Trend Vision One with CNAPP secures your cloud workloads and containers without sacrificing performance. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980290086122991641) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-20T15:08Z 51.9K followers, XXX engagements


"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980589884801700303) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T11:00Z 51.8K followers, XXX engagements


"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980635182777381256) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T14:00Z 51.9K followers, XXX engagements


"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980952271664853159) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T11:00Z 51.9K followers, XXX engagements


"Threat actors are rapidly adopting the Vidar XXX infostealer as Lumma Stealer fades. Learn how its improved evasion and exfiltration methods are shaping security strategies across organizations. Full report on our blog:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981073069994094867) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T19:00Z 51.8K followers, XXX engagements


"Sensitive personal and financial data leaks from a doxxing campaign have triggered loss of key personnel in Lumma Stealers operation increasing distrust and internal conflict among cybercriminals. Read our full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981103268135633003) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T21:00Z 51.8K followers, XXX engagements


"Our analysis of over 22000 MCP repositories found several security risks and issues. Containerization can help mitigate the risk but only when paired with least privilege and strict policies. Discover best practices for securing your AI supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981163666197098912) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T01:00Z 51.9K followers, XXX engagements


"The Lumma Stealer (Water Kurita) doxxing incident leaked sensitive info like passport numbers and bank accounts fueling distrust and accusations of betrayal in the cybercrime community destabilizing Lumma Stealers operations. See our full findings:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981224063063277780) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T05:00Z 51.8K followers, XXX engagements


"When companies use plugins in popular software like Autodesk Revit they trust that their files are secure. But embedded cloud credentials can put that trust at risk. Find out how organizations can avoid similar mistakes in our research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981284459207909719) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T09:00Z 51.8K followers, XXX engagements


"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981314658557432216) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T11:00Z 51.8K followers, XXX engagements


"Operation Serengeti 2.0s success was fueled by collaboration across XX African nations the UK and Trend Micros threat research expertise. Discover how international cooperation helps in the fight against cybercrime on our blog:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981359957514563746) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T14:00Z 51.8K followers, XXX engagements


"LockBit 5.0s continued activity after Operation Cronos shows that ransomware groups adapt quickly. Defenders should prioritize real-time threat intelligence frequent review of security controls and proactive hunting for evolving tactics. See our latest report:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981405263111320055) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T17:00Z 51.9K followers, XXX engagements


"Combat recruiter impersonation: Clearly outline your hiring process on your careers page and specify what official channels you use for communication and that you never request payments. Transparency deters scammers and protects candidates. Learn more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981465654499643512) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T21:00Z 51.9K followers, XXX engagements


"Attackers are exploiting some unpatched Cisco devices for persistent access. Trend Micros platform delivers automatic detection and response with Trend Vision One offering advanced cloud workload and container protection. Read our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981646846679224500) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T09:00Z 51.9K followers, XXX engagements


"LockBit XXX builds on LockBit XXX by reusing core code including hashing algorithms and API resolution methods. This incremental upgrade means defenders must update detection rules to cover both legacy and new LockBit XXX patterns. See our technical analysis for details:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982084732159402124) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T14:00Z 51.9K followers, XX engagements


"1/6 Oracle has released an emergency patch for CVE-2025-61882 a critical pre-authentication remote code execution vulnerability in E-Business Suite. Active exploitation has been observed demanding immediate action"  
[X Link](https://x.com/TrendMicroRSRCH/status/1975783416491594161) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-08T04:40Z 51.8K followers, XXX engagements


"The LockBit XXX ransomware targets Windows Linux and ESXi endpoints and servers increasing risk across multiple platforms. Strengthen defenses with layered protection cross-platform visibility EDR and log correlation. Explore our threat hunting guidance:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1977736078384668694) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-13T14:00Z 51.8K followers, XXX engagements


"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980562202466623760) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T09:10Z 51.8K followers, XXX engagements


"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980680482028204036) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T17:00Z 51.8K followers, XXX engagements


"Trend Research reveals a targeted campaign using SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980740880286843168) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T21:00Z 51.8K followers, XXX engagements


"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980922073770868902) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T09:00Z 51.8K followers, XXX engagements


"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980982470041378966) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-22T13:00Z 51.8K followers, XXX engagements


"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. Full details:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981767645855694853) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T17:00Z 51.8K followers, XXX engagements


"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981888439520804968) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T01:00Z 51.8K followers, XXX engagements


"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980520415060505016) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T06:23Z 51.8K followers, XXX engagements


"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1980537035401167188) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-21T07:30Z 51.8K followers, XXX engagements


"The Shai-hulud worm is spreading through compromised Node Package Manager packages stealing cloud tokens and deploying secret-scanning tools. Trend Vision One detects and blocks related IOCs. Access our threat hunting queries and full details:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981254261947130175) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-23T07:00Z 51.8K followers, XXX engagements


"Automation saves time but can also save adversaries from exposure if their malicious flows go undetected. Trend Micros analysis explains the visibility gaps and how to plug them. Proactively secure your systems:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981526054519853177) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T01:00Z 51.8K followers, XXX engagements


"Coordinated intrusions by Earth Estries and Earth Naga show that defenders must rethink attribution and monitor the broader China-aligned APT ecosystem not just isolated groups. Get the latest insights:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981571352889799121) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T04:00Z 51.8K followers, XXX engagements


"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981586450618449959) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T05:00Z 51.8K followers, XXX engagements


"Vidar Stealer XXX complicates incident response by cleaning up artifacts to evade forensic analysis. Trend Vision One delivers real-time protection and detection guidance. Access actionable insights in our full research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981707247139922330) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T13:00Z 51.8K followers, XXX engagements


"Attackers are exploiting some unpatched Cisco devices for persistent access. Trend Micros platform delivers automatic detection and response with Trend Vision One offering advanced cloud workload and container protection. Read our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981828041836740977) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-24T21:00Z 51.8K followers, XXX engagements


"Operation Zero Disco exemplifies the sophistication of modern attacks targeting network hardware. Our platforms real-time threat intelligence and IOC sweeping help organizations identify and contain risks before they escalate. Dive deeper into our research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1981979036986363983) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T07:00Z 51.8K followers, XXX engagements


"The Gentlemen ransomware group is advancing operations with custom tools to bypass security vendors and evade defenses in specific environments. Learn how to use threat intelligence on their tactics to anticipate attacks and strengthen defenses:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982009236352635219) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T09:00Z 51.8K followers, XXX engagements


"Shared access and operational overlap among China-aligned APTs are complicating attribution for CTI teams. Defenders must monitor the entire threat ecosystem not just isolated groups. Read our full analysis:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982009236361023751) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T09:00Z 51.8K followers, XXX engagements


"Security companies routinely publish detailed TTPs which help defenders yet also assist attackers in vibe-coding copycat malware. Reading without adaptation is insufficient for todays threat landscape. Proactively secure your threat intelligence:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982130031091466276) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T17:00Z 51.8K followers, XXX engagements


"Trend Research reveals a targeted campaign using SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise. Read:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982190430369231021) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-25T21:00Z 51.8K followers, XXX engagements


"Organizations with exposed network devices risk data theft and disruption from RondoDoxs shotgun approach. The lifecycle of n-day exploits poses ongoing challenges requiring robust vulnerability management. See our technical breakdown:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982250827726065837) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-26T01:00Z 51.8K followers, XXX engagements


"Vidar Stealer XXX continues the trend of advanced infostealers leveraging a code rewrite and multithreaded operations for efficient stealthy data theft. Discover what this means for enterprise risk management in our latest research:"  
[X Link](https://x.com/TrendMicroRSRCH/status/1982281026710728850) [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) 2025-10-26T03:00Z 51.8K followers, XXX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@TrendMicroRSRCH Avatar @TrendMicroRSRCH Trend Micro Research

Trend Micro Research posts on X about $4704t, whatsapp, for your, realtime the most. They currently have XXXXXX followers and 2505 posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX +104%
  • X Month XXXXXX -XX%
  • X Months XXXXXXXXXX +197%
  • X Year XXXXXXXXXX +29%

Mentions: XX #

Mentions Line Chart

  • X Week XX +53%
  • X Month XXX -XX%
  • X Months XXXXX +80%
  • X Year XXXXX +417%

Followers: XXXXXX #

Followers Line Chart

  • X Week XXXXXX -XXXX%
  • X Month XXXXXX -XXXX%
  • X Months XXXXXX -XXXX%
  • X Year XXXXXX -XXXX%

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence technology brands finance social networks travel destinations cryptocurrencies stocks

Social topic influence $4704t #3, whatsapp, for your, realtime #388, telegram, $6753t, rival, safely #1077, cisco #78, insurance

Top assets mentioned Cronos (CRO)

Top Social Posts #


Top posts by engagements in the last XX hours

"The Gentlemen ransomware group has targeted multiple industries and regions focusing particularly on sectors such as manufacturing construction healthcare and insurance with attacks spanning at least XX countries. Learn their tactics:"
X Link @TrendMicroRSRCH 2025-10-24T07:00Z 51.8K followers, XXX engagements

"The spike in task scam reports to the FTC suggest that cybercriminals are getting big payouts from these scams. Attackers are using initial small payouts and escalating deposit requests. Learn what a task scam is the modus operandi and how you can safeguard yourself from this threat:"
X Link @TrendMicroRSRCH 2025-10-22T01:00Z 51.8K followers, XXX engagements

"Sensitive personal and financial data leaks from a doxxing campaign have triggered loss of key personnel in Lumma Stealers operation increasing distrust and internal conflict among cybercriminals. Read our full analysis:"
X Link @TrendMicroRSRCH 2025-10-25T03:00Z 51.8K followers, XXX engagements

"Phishing campaigns are abusing trusted web builders by hosting fake CAPTCHA pages designed to evade automated scanners and trick users. Learn how attackers bypass security controls and how to defend against these threats:"
X Link @TrendMicroRSRCH 2025-10-25T05:00Z 51.8K followers, XXX engagements

"1/8 Trend Micros latest analysis found that the Chaos ransomware campaign is leveraging advanced anti-EDR techniques. Our telemetry confirms malicious DLL sideloading and kernel-level driver deployment enabling broad defense evasion"
X Link @TrendMicroRSRCH 2025-09-30T09:00Z 51.8K followers, 1050 engagements

"5/6 We strongly advise applying Oracles official patch and supplementing with Trend Micros endpoint and network protections. Layered defense is key to minimizing risk"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.9K followers, XXX engagements

"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.8K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"
X Link @TrendMicroRSRCH 2025-10-11T07:00Z 51.8K followers, XXX engagements

"When software contains embedded credentials attackers can target the supply chain and manipulate distributed updates. We detail the risks and offer guidance for organizations to secure their software:"
X Link @TrendMicroRSRCH 2025-10-13T09:00Z 51.8K followers, XXX engagements

"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"
X Link @TrendMicroRSRCH 2025-10-14T01:00Z 51.9K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-14T05:00Z 51.8K followers, XXX engagements

"Data and model poisoning threaten #AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"
X Link @TrendMicroRSRCH 2025-10-20T09:30Z 51.8K followers, XXX engagements

"Organizations with exposed network devices risk data theft and disruption from RondoDoxs shotgun approach. The lifecycle of n-day exploits poses ongoing challenges requiring robust vulnerability management. See our technical breakdown:"
X Link @TrendMicroRSRCH 2025-10-22T05:00Z 51.9K followers, XXX engagements

"The SORVEPOTEL malware campaign is exploiting WhatsApp Web sessions to spread malicious ZIP files affecting Brazils public and private sectors. Review your organizations policies on desktop messaging and file sharing. Read:"
X Link @TrendMicroRSRCH 2025-10-22T07:00Z 51.9K followers, XXX engagements

"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. Full details:"
X Link @TrendMicroRSRCH 2025-10-22T14:00Z 51.9K followers, XXX engagements

"RondoDox exploits Pwn2Own-discovered flaws in routers DVRs and more now with loader-as-a-service & Mirai/Morte payloads making detection harder. Patch and monitor your devices. Learn how to boost your defenses:"
X Link @TrendMicroRSRCH 2025-10-22T17:00Z 51.9K followers, XXX engagements

"AI-assisted code generation now makes it easier to turn public security reports into malware blueprints. The way TTPs are shared and absorbed needs careful consideration to prevent misuse. Proactively secure your knowledge sharing:"
X Link @TrendMicroRSRCH 2025-10-24T11:00Z 51.8K followers, XXX engagements

"Power Automate misuse can result in data exfiltration and covert channels. Discover how attackers use persistent flows and how you can safeguard your systems. Full story here:"
X Link @TrendMicroRSRCH 2025-10-24T14:00Z 51.8K followers, XXX engagements

"Data and model poisoning threaten AI integrity. Our proactive security roadmap includes advanced detection to keep your LLMs resilient and trustworthy. Get actionable tips in our latest research:"
X Link @TrendMicroRSRCH 2025-10-24T19:00Z 51.8K followers, XXX engagements

"Wondershare RepairIt an AI app embedded cloud credentials in its code exposing user photos and internal assets. Attackers could manipulate files or deliver malicious updates via trusted channels. Learn more:"
X Link @TrendMicroRSRCH 2025-10-25T11:00Z 51.8K followers, XXX engagements

"SORVEPOTEL malware is spreading via WhatsApp Web by sending unsolicited ZIP files to contacts. Opening these files on a desktop triggers automatic propagation to more users. Learn how to defend against this attack:"
X Link @TrendMicroRSRCH 2025-10-09T01:00Z 51.9K followers, XXX engagements

"Poor credential management in popular image and video repair software Wondershare RepairIt has exposed years of user data. Learn what this means for your privacy and how to keep your information secure:"
X Link @TrendMicroRSRCH 2025-10-10T01:00Z 51.9K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-10T05:00Z 51.9K followers, XXX engagements

"Wondershare RepairIt a popular AI-powered image and video repair app put sensitive user photos at risk by embedding overly permissive cloud access tokens in its code. This security lapse also exposed company AI models software and source code contradicting privacy assurances. Learn how to protect your data and what organizations should do differently:"
X Link @TrendMicroRSRCH 2025-10-10T07:00Z 51.9K followers, XXX engagements

"EvilAI exfiltrates browser data and maintains encrypted command-and-control comms making visibility and response critical. Find out how Trend Vision One helps mitigate this threat:"
X Link @TrendMicroRSRCH 2025-10-13T21:00Z 51.9K followers, XXX engagements

"Trend Research exposes how attackers use SNMP and Telnet exploits to compromise Cisco switches and deploy rootkits. See how Trend Vision One enables proactive defense:"
X Link @TrendMicroRSRCH 2025-10-15T17:00Z 51.9K followers, 3931 engagements

"Trend Research reveals a targeted campaign utilizing SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise:"
X Link @TrendMicroRSRCH 2025-10-20T07:00Z 51.9K followers, XXX engagements

"Operation Zero Disco shows why patching network hardware is vital. Trend Micro detects and neutralizes these advanced exploits while Trend Vision One with CNAPP secures your cloud workloads and containers without sacrificing performance. Learn more:"
X Link @TrendMicroRSRCH 2025-10-20T15:08Z 51.9K followers, XXX engagements

"Overly permissive SAS tokens amplify risk and even trusted vendors can inadvertently expose secrets. Regularly restrict cloud access and audit distribution mechanisms continuous assessment is essential for secure plugin development. Read our insights:"
X Link @TrendMicroRSRCH 2025-10-21T11:00Z 51.8K followers, XXX engagements

"Hardcoded credentials in Wondershare RepairIt have left private user data and sensitive company information vulnerable to attacks. Our latest research explains how this happened and what you can do to protect your data and systems:"
X Link @TrendMicroRSRCH 2025-10-21T14:00Z 51.9K followers, XXX engagements

"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"
X Link @TrendMicroRSRCH 2025-10-22T11:00Z 51.9K followers, XXX engagements

"Threat actors are rapidly adopting the Vidar XXX infostealer as Lumma Stealer fades. Learn how its improved evasion and exfiltration methods are shaping security strategies across organizations. Full report on our blog:"
X Link @TrendMicroRSRCH 2025-10-22T19:00Z 51.8K followers, XXX engagements

"Sensitive personal and financial data leaks from a doxxing campaign have triggered loss of key personnel in Lumma Stealers operation increasing distrust and internal conflict among cybercriminals. Read our full analysis:"
X Link @TrendMicroRSRCH 2025-10-22T21:00Z 51.8K followers, XXX engagements

"Our analysis of over 22000 MCP repositories found several security risks and issues. Containerization can help mitigate the risk but only when paired with least privilege and strict policies. Discover best practices for securing your AI supply chain:"
X Link @TrendMicroRSRCH 2025-10-23T01:00Z 51.9K followers, XXX engagements

"The Lumma Stealer (Water Kurita) doxxing incident leaked sensitive info like passport numbers and bank accounts fueling distrust and accusations of betrayal in the cybercrime community destabilizing Lumma Stealers operations. See our full findings:"
X Link @TrendMicroRSRCH 2025-10-23T05:00Z 51.8K followers, XXX engagements

"When companies use plugins in popular software like Autodesk Revit they trust that their files are secure. But embedded cloud credentials can put that trust at risk. Find out how organizations can avoid similar mistakes in our research:"
X Link @TrendMicroRSRCH 2025-10-23T09:00Z 51.8K followers, XXX engagements

"SORVEPOTEL is a self-propagating malware that hijacks WhatsApp Web sessions sending infected ZIP files to all contacts. Opening the ZIP on a desktop enables rapid spread leading to account bans and potential network compromise. Learn more:"
X Link @TrendMicroRSRCH 2025-10-23T11:00Z 51.8K followers, XXX engagements

"Operation Serengeti 2.0s success was fueled by collaboration across XX African nations the UK and Trend Micros threat research expertise. Discover how international cooperation helps in the fight against cybercrime on our blog:"
X Link @TrendMicroRSRCH 2025-10-23T14:00Z 51.8K followers, XXX engagements

"LockBit 5.0s continued activity after Operation Cronos shows that ransomware groups adapt quickly. Defenders should prioritize real-time threat intelligence frequent review of security controls and proactive hunting for evolving tactics. See our latest report:"
X Link @TrendMicroRSRCH 2025-10-23T17:00Z 51.9K followers, XXX engagements

"Combat recruiter impersonation: Clearly outline your hiring process on your careers page and specify what official channels you use for communication and that you never request payments. Transparency deters scammers and protects candidates. Learn more:"
X Link @TrendMicroRSRCH 2025-10-23T21:00Z 51.9K followers, XXX engagements

"Attackers are exploiting some unpatched Cisco devices for persistent access. Trend Micros platform delivers automatic detection and response with Trend Vision One offering advanced cloud workload and container protection. Read our latest research:"
X Link @TrendMicroRSRCH 2025-10-24T09:00Z 51.9K followers, XXX engagements

"LockBit XXX builds on LockBit XXX by reusing core code including hashing algorithms and API resolution methods. This incremental upgrade means defenders must update detection rules to cover both legacy and new LockBit XXX patterns. See our technical analysis for details:"
X Link @TrendMicroRSRCH 2025-10-25T14:00Z 51.9K followers, XX engagements

"1/6 Oracle has released an emergency patch for CVE-2025-61882 a critical pre-authentication remote code execution vulnerability in E-Business Suite. Active exploitation has been observed demanding immediate action"
X Link @TrendMicroRSRCH 2025-10-08T04:40Z 51.8K followers, XXX engagements

"The LockBit XXX ransomware targets Windows Linux and ESXi endpoints and servers increasing risk across multiple platforms. Strengthen defenses with layered protection cross-platform visibility EDR and log correlation. Explore our threat hunting guidance:"
X Link @TrendMicroRSRCH 2025-10-13T14:00Z 51.8K followers, XXX engagements

"Threat actors are rapidly exploiting new vulnerabilities increasing risk for organizations with internet-exposed devices. The shrinking window between disclosure and exploitation highlights the need for strong network segmentation and asset oversight. Full analysis:"
X Link @TrendMicroRSRCH 2025-10-21T09:10Z 51.8K followers, XXX engagements

"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"
X Link @TrendMicroRSRCH 2025-10-21T17:00Z 51.8K followers, XXX engagements

"Trend Research reveals a targeted campaign using SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise. Read:"
X Link @TrendMicroRSRCH 2025-10-21T21:00Z 51.8K followers, XXX engagements

"A flaw in NVIDIA Merlin shows how model checkpoint loading can escalate into remote code execution. CVE-2025-23298 is patched but ML pipelines must be hardened against unsafe inputs. Read our discovery:"
X Link @TrendMicroRSRCH 2025-10-22T09:00Z 51.8K followers, XXX engagements

"A targeted exposure campaign and compromised Telegram accounts led to a sharp decline in Lumma Stealer (Water Kurita) activity driving customers to rival MaaS platforms like Vidar and StealC. Read our full research on the evolving infostealer landscape:"
X Link @TrendMicroRSRCH 2025-10-22T13:00Z 51.8K followers, XXX engagements

"Protecting agentic edge AI isnt just about software. Its about securing the entire system from sensors to cloud connections. See Trend Micros comprehensive strategies in our latest research. Full details:"
X Link @TrendMicroRSRCH 2025-10-24T17:00Z 51.8K followers, XXX engagements

"File formats distributed via trusted cloud channels can become potent attack vectors if credentials leak. Trend Vision One Code Security helps detect exposed credentials in CI/CD pipelines. See best practices to secure your supply chain:"
X Link @TrendMicroRSRCH 2025-10-25T01:00Z 51.8K followers, XXX engagements

"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"
X Link @TrendMicroRSRCH 2025-10-21T06:23Z 51.8K followers, XXX engagements

"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"
X Link @TrendMicroRSRCH 2025-10-21T07:30Z 51.8K followers, XXX engagements

"The Shai-hulud worm is spreading through compromised Node Package Manager packages stealing cloud tokens and deploying secret-scanning tools. Trend Vision One detects and blocks related IOCs. Access our threat hunting queries and full details:"
X Link @TrendMicroRSRCH 2025-10-23T07:00Z 51.8K followers, XXX engagements

"Automation saves time but can also save adversaries from exposure if their malicious flows go undetected. Trend Micros analysis explains the visibility gaps and how to plug them. Proactively secure your systems:"
X Link @TrendMicroRSRCH 2025-10-24T01:00Z 51.8K followers, XXX engagements

"Coordinated intrusions by Earth Estries and Earth Naga show that defenders must rethink attribution and monitor the broader China-aligned APT ecosystem not just isolated groups. Get the latest insights:"
X Link @TrendMicroRSRCH 2025-10-24T04:00Z 51.8K followers, XXX engagements

"The future of autonomous devices depends on strong security. This report from Trend Research reveals how to defend against attacks and ensure your technology works safely and reliably. Read more:"
X Link @TrendMicroRSRCH 2025-10-24T05:00Z 51.8K followers, XXX engagements

"Vidar Stealer XXX complicates incident response by cleaning up artifacts to evade forensic analysis. Trend Vision One delivers real-time protection and detection guidance. Access actionable insights in our full research:"
X Link @TrendMicroRSRCH 2025-10-24T13:00Z 51.8K followers, XXX engagements

"Attackers are exploiting some unpatched Cisco devices for persistent access. Trend Micros platform delivers automatic detection and response with Trend Vision One offering advanced cloud workload and container protection. Read our latest research:"
X Link @TrendMicroRSRCH 2025-10-24T21:00Z 51.8K followers, XXX engagements

"Operation Zero Disco exemplifies the sophistication of modern attacks targeting network hardware. Our platforms real-time threat intelligence and IOC sweeping help organizations identify and contain risks before they escalate. Dive deeper into our research:"
X Link @TrendMicroRSRCH 2025-10-25T07:00Z 51.8K followers, XXX engagements

"The Gentlemen ransomware group is advancing operations with custom tools to bypass security vendors and evade defenses in specific environments. Learn how to use threat intelligence on their tactics to anticipate attacks and strengthen defenses:"
X Link @TrendMicroRSRCH 2025-10-25T09:00Z 51.8K followers, XXX engagements

"Shared access and operational overlap among China-aligned APTs are complicating attribution for CTI teams. Defenders must monitor the entire threat ecosystem not just isolated groups. Read our full analysis:"
X Link @TrendMicroRSRCH 2025-10-25T09:00Z 51.8K followers, XXX engagements

"Security companies routinely publish detailed TTPs which help defenders yet also assist attackers in vibe-coding copycat malware. Reading without adaptation is insufficient for todays threat landscape. Proactively secure your threat intelligence:"
X Link @TrendMicroRSRCH 2025-10-25T17:00Z 51.8K followers, XXX engagements

"Trend Research reveals a targeted campaign using SNMP and Telnet exploits against some Cisco switches allowing attackers to deploy persistent rootkits. Discover how Trend Vision One delivers centralized risk management and proactive defense for your enterprise. Read:"
X Link @TrendMicroRSRCH 2025-10-25T21:00Z 51.8K followers, XXX engagements

"Organizations with exposed network devices risk data theft and disruption from RondoDoxs shotgun approach. The lifecycle of n-day exploits poses ongoing challenges requiring robust vulnerability management. See our technical breakdown:"
X Link @TrendMicroRSRCH 2025-10-26T01:00Z 51.8K followers, XXX engagements

"Vidar Stealer XXX continues the trend of advanced infostealers leveraging a code rewrite and multithreaded operations for efficient stealthy data theft. Discover what this means for enterprise risk management in our latest research:"
X Link @TrendMicroRSRCH 2025-10-26T03:00Z 51.8K followers, XXX engagements

creator/x::TrendMicroRSRCH
/creator/x::TrendMicroRSRCH