[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @TrendMicroRSRCH Trend Micro Research Trend Micro Research posts on X about $4704t, blog, #ai, bert the most. They currently have XXXXXX followers and 1698 posts still getting attention that total XXXXXXX engagements in the last XX hours. ### Engagements: XXXXXXX [#](/creator/twitter::11927342/interactions)  - X Week XXXXXXXXX +138% - X Month XXXXXXXXX +41% - X Months XXXXXXXXX +128% - X Year XXXXXXXXXX +16% ### Mentions: XX [#](/creator/twitter::11927342/posts_active)  - X Month XXX -XX% - X Months XXXXX +854% - X Year XXXXX +297% ### Followers: XXXXXX [#](/creator/twitter::11927342/followers)  - X Week XXXXXX +0.06% - X Month XXXXXX +0.19% - X Months XXXXXX -XXXX% - X Year XXXXXX -XXXX% ### CreatorRank: XXXXXX [#](/creator/twitter::11927342/influencer_rank)  ### Social Influence [#](/creator/twitter::11927342/influence) --- **Social category influence** [technology brands](/list/technology-brands) [finance](/list/finance) [stocks](/list/stocks) [countries](/list/countries) [travel destinations](/list/travel-destinations) [social networks](/list/social-networks) **Social topic influence** [$4704t](/topic/$4704t) #1, [blog](/topic/blog), [#ai](/topic/#ai), [bert](/topic/bert), [realworld](/topic/realworld), [ip](/topic/ip), [realtime](/topic/realtime), [agentic](/topic/agentic), [countries](/topic/countries), [soc](/topic/soc) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) ### Top Social Posts [#](/creator/twitter::11927342/posts) --- Top posts by engagements in the last XX hours "Flodrix malware uses the #Langflow exploit to kill critical processes and evade forensics. Monitor for abnormal process activity and outbound connections to stay ahead. Read the research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944924880215900276) 2025-07-15 01:00:01 UTC 51.9K followers, XXX engagements "Trend Vision One mitigates X of the #OWASP Top XX large language model risks. Backed by continuous research and integrated threat detection it provides enterprise-grade protection to secure #AI deployment at scale. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942086199746687074) 2025-07-07 05:00:06 UTC 51.9K followers, XXX engagements "WATCH 🎬: AI hallucinations can lead to #slopsquatting a new supply-chain threat in #AI-powered workflows. Learn how advanced coding agents are addressing these vulnerabilities. Dive into the details in our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942374333667525095) 2025-07-08 00:05:03 UTC 51.9K followers, XXX engagements "Looking ahead: Robert McArdle shares his predictions for the undergrounds evolution and what blue teams should anticipate in coming years. Watch the video then visit our blog to learn more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942993235996967248) 2025-07-09 17:04:21 UTC 51.9K followers, XXX engagements "Containers with elevated privileges are a growing risk in cloud workloads. We detail how attackers extract #AWS credentials using packet sniffing and API spoofing techniques. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946012040620904460) 2025-07-18 01:00:00 UTC 51.9K followers, XXX engagements "Based on our investigation cybercriminals initiated the attack by scanning for publicly exposed Langflow serversgathering IP addresses and open ports using tools like Shodan or FOFA. Proactive security starts with reducing exposure:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942901548067012608) 2025-07-09 11:00:01 UTC 51.9K followers, XXX engagements "As you vibe code with #AI be aware of #slopsquatting risks. Our research explores how real-time validation can prevent phantom dependencies. Learn more here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944985326193095027) 2025-07-15 05:00:12 UTC 51.9K followers, XXX engagements "What first drove Trend Micro to launch the Underground Series Robert McArdle discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945378424375181361) 2025-07-16 07:02:14 UTC 51.9K followers, XXX engagements "#AI hallucinations in coding can lead to #slopsquatting threats. Learn how automated testing and human oversight can mitigate risks. Read more in our report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946525482775622095) 2025-07-19 11:00:14 UTC 51.9K followers, XXX engagements "Proactive security is no longer optional. As deepfake threats evolve staying ahead requires both technology and awareness. Download our comprehensive report for actionable strategies to protect your organization. Full report available now:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946027141839061019) 2025-07-18 02:00:00 UTC 51.9K followers, XXX engagements "Our report reveals how #Anubis operates a flexible affiliate model with negotiable revenue splits with added monetization paths like data extortion and access sales. Understand the broader implications for your organization:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945015473566842943) 2025-07-15 07:00:00 UTC 51.9K followers, XXX engagements "How do #AI-generated phantom dependencies create openings for attackers Our research on #slopsquatting reveals the risks and solutions. Read more in our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944200151599354194) 2025-07-13 01:00:12 UTC 51.9K followers, XXX engagements "Are your #AI workflows vulnerable to #slopsquatting attacks Our blog explores how AI coding assistants can hallucinate malicious package names. Learn more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945740823414366524) 2025-07-17 07:02:17 UTC 51.9K followers, XXX engagements "Not all agentic AIs are equal. True #agenticAI features multi-step reasoning self-improvement and real-world action requiring a new security mindset. Read for more insights:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945287265560801404) 2025-07-16 01:00:00 UTC 51.9K followers, XXX engagements "How do cybercriminals think Our Cybercriminal Underground series answers this with insights from XX years of research. Thousands of pages across XX reports now available in one place. Explore:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943309231395930476) 2025-07-10 14:00:00 UTC 51.9K followers, XXX engagements "A proactive security strategy reduces the overall impact of cyberattacks. Find out which key components drive true cyber resilience in our latest report. More details here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943898112080171059) 2025-07-12 05:00:00 UTC 51.9K followers, XXX engagements "Strengthen your cybersecurity posture against stored prompt injection and vector store poisoning. Trend Micro's research provides key insights for protecting AI-enabled databases. Read the full analysis:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940213835060654404) 2025-07-02 01:00:00 UTC 51.9K followers, XXX engagements "Why do we keep monitoring the cybercriminal underground Robert McArdle (@bobmcardle) explains how continuous intelligence gives security pros the edge in proactive defense. See the video and read the reports for insights:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940787677135024295) 2025-07-03 15:00:14 UTC 51.9K followers, 698.2K engagements "#LLMs are exposed to threats like prompt injection model theft and data poisoning. Trend Micro Research aligns with the #OWASP Top XX for LLMs and provides actionable defense strategies across the AI lifecycle. Explore the risks:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945121200138563913) 2025-07-15 14:00:07 UTC 51.9K followers, XXX engagements "New research shows that higher cyber risk exposure significantly increases the damage caused by attacks. Discover how Trend Micro Managed Detection and Response helps mitigate these risks. Read the article for more insights:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943112937989689750) 2025-07-10 01:00:00 UTC 51.9K followers, XXX engagements "Threat actors leverage #TikTok's vast reach with videos that instruct users to execute malicious commands under the guise of software activation. This highlights the importance of reinforcing security awareness. Learn more about this evolving threat:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941497294454501793) 2025-07-05 14:00:00 UTC 51.9K followers, XXX engagements "#OperationSecure an initiative helmed by @interpol_cyber with @TrendMicro as a key partner enabled law enforcement across XX countries to dismantle over 20000 malicious IPs/domains and seize XX criminal servers targeting the Asia-Pacific region. Read the full story for details:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944290704139657550) 2025-07-13 07:00:01 UTC 51.9K followers, XXX engagements "1/5 Here are the top X must-know insights from our latest EchoLeak research a zero-click exploit targeting AI assistants like Microsoft XXX Copilot. Heres what every cybersecurity professional needs to know"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945054896539025436) 2025-07-15 09:36:39 UTC 51.9K followers, 67.4K engagements "Not all agentic AIs are equal. True #agenticAI features multi-step reasoning self-improvement and real-world action requiring a new security mindset. Read for more insights:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941723786048385125) 2025-07-06 05:00:00 UTC 51.9K followers, XXX engagements "How do cybercriminals think Our Cybercriminal Underground series answers this with insights from XX years of research. Thousands of pages across XX reports now available in one place. Explore:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940697019263176827) 2025-07-03 09:00:00 UTC 51.9K followers, XXX engagements "50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1939953858026893641) 2025-07-01 07:46:57 UTC 51.9K followers, XXX engagements "Criminals are bypassing traditional KYC and authentication processes using highly realistic deepfakes built on easily available software. We break down the tactics tools and red flags SOC teams need to know right now. Get the key findings on our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943943412094308445) 2025-07-12 08:00:00 UTC 51.9K followers, XXX engagements "2/5 Attackers use invisible prompt injections like hidden HTML comments to silently exfiltrate sensitive data through AI assistants"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945054901706338651) 2025-07-15 09:36:40 UTC 51.9K followers, 62.8K engagements "Attackers are exploiting misconfigured Docker #APIs to gain access to containerized environments then using Tor to mask their activities while deploying crypto miners. Discover how this method works and its implications for security operations:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942388167258034385) 2025-07-08 01:00:01 UTC 51.9K followers, 1897 engagements "Dive into 14+ years of global threat research motives tactics business models. Stay ahead of threat actors with Trend Micro:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940681921651982403) 2025-07-03 08:00:00 UTC 51.9K followers, XXX engagements "#OperationSecure resulted in XX arrests the seizure of XX criminal servers and over 216000 victim notifications. Key infostealer families Vidar Lumma Stealer and Rhadamanthys were identified and disrupted. Discover the full story:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945845950829703671) 2025-07-17 14:00:01 UTC 51.9K followers, XXX engagements "The dual-threat approach of the #RaaS group #Anubis can severely damage a companys critical data by encrypting and wiping directories. Read our latest insights on its impact and defensive measures. Be proactive and learn more here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943475326719304128) 2025-07-11 01:00:00 UTC 51.9K followers, XXX engagements "In the almost XX years we have monitored the cybercriminal underground what trends stood out the most Robert McArdle highlights surprising findings and lessons that can inform your threat hunting and defense strategies. Watch the video and visit our blog to find out more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944622939111833650) 2025-07-14 05:00:12 UTC 51.9K followers, XXX engagements "Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944396434901512410) 2025-07-13 14:00:09 UTC 51.9K followers, XXX engagements "BERT ransomware disables Defender firewall and UAC using PowerShell before encryption even starts. Audit privileged PowerShell use and enforce script controls now. Find proactive defense strategies here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946132836928331817) 2025-07-18 09:00:00 UTC 51.9K followers, XXX engagements "Why do we keep monitoring the cybercriminal underground Robert McArdle explains how continuous intelligence gives security pros the edge in proactive defense. See the video and read the reports for insights:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943837790220775454) 2025-07-12 01:00:18 UTC 51.9K followers, XXX engagements "Mapping and seizing infostealer C&C servers enables real-time victim alerts and strategic disruption. Operation Secure shows how public-private partnerships deliver immediate and long-term results. Read the full story:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946253636947902492) 2025-07-18 17:00:01 UTC 51.9K followers, XXX engagements "Proactive security is essential for LLM applications. Trend Vision One addresses X of #OWASPs Top XX LLM risks empowering SOCs and CISOs to stay ahead of evolving threats. Explore our in-depth research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943626350268502257) 2025-07-11 11:00:07 UTC 51.9K followers, XXX engagements "#AgenticAI expands the attack surface and amplifies traditional risks like misconfigurations and unauthorized access. Layered defense strategies are a must. Get best practices from our report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944034008947404989) 2025-07-12 14:00:00 UTC 51.9K followers, XXX engagements "The cybercriminal underground has evolved rapidly in XX years. Robert McArdle breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946163125725614467) 2025-07-18 11:00:21 UTC 51.9K followers, XXX engagements "Our blog explores how overprivileged containers in cloud environments can lead to unauthorized data access and privilege escalation. Learn how to mitigate risks like packet sniffing and #API #spoofing through stronger IAM controls and network visibility:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943203537489453330) 2025-07-10 07:00:00 UTC 51.9K followers, 1537 engagements "From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940259133061472445) 2025-07-02 04:00:00 UTC 51.9K followers, XXX engagements "Anubis' dual-threat #ransomware capabilities and flexible affiliate programs make it a growing force in the threat landscape. Multi-layered defense and proactive monitoring are key to combating its evolving tactics. Find out more about this emerging threat here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945800650928931315) 2025-07-17 11:00:01 UTC 51.9K followers, XXX engagements "Cybercriminals exploit Docker APIs and the Tor network to mine cryptocurrency undetected. This stealthy method targets cloud-heavy industries like technology finance and healthcare. Full details in our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943173338265686436) 2025-07-10 05:00:00 UTC 51.9K followers, XXX engagements "1/6 Agenda one of 2025s most active ransomware groups is exploiting MeshAgent and Windows Subsystem for Linux (WSL) to deploy Linux payloads on Windows systems. This raises the bar for cross-platform attack sophistication"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942720354390081694) 2025-07-08 23:00:01 UTC 51.9K followers, XXX engagements "50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945347665178353700) 2025-07-16 05:00:00 UTC 51.9K followers, XXX engagements "From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942539159182152129) 2025-07-08 11:00:00 UTC 51.9K followers, XXX engagements "From romance scams in Spain to enterprise fraud in Hong Kong deepfakes are being deployed in real-world attacks. Our experts analyze case studies and share guidance for building resilient proactive security frameworks. Read our report for more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945498660910887397) 2025-07-16 15:00:01 UTC 51.9K followers, XXX engagements "The cybercriminal underground has evolved rapidly in XX years. Robert McArdle breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942584518059192438) 2025-07-08 14:00:15 UTC 51.9K followers, XXX engagements "We observed attackers leveraging zstd a tool based on the #ZStandard algorithm known for strong compression and fast decompression. Learn about this technique and what to watch out for:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944713487097217461) 2025-07-14 11:00:01 UTC 51.9K followers, XXX engagements "BERT ransomware targets ESXi VMs encrypting snapshots to block recovery. Ensure regular offsite VM backups and test recovery processes for virtual infrastructure. For a full technical analysis visit our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943324331867590878) 2025-07-10 15:00:00 UTC 51.9K followers, XXX engagements "Attackers exploit Python AST parsing and exec() in Langflow to run arbitrary code. Audit access controls and application logic for similar weak points. Get the full technical deep dive:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945710054688092161) 2025-07-17 05:00:01 UTC 51.9K followers, 1063 engagements "BERT ransomwares Linux variant targets server environments so dont ignore Linux endpoints. Harden SSH access and monitor for suspicious binary executions. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943747118687981880) 2025-07-11 19:00:00 UTC 51.9K followers, XXX engagements "What first drove Trend Micro to launch the Underground Series Robert McArdle discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941814433031815325) 2025-07-06 11:00:12 UTC 51.9K followers, XXX engagements "Organizations that use containerized applications may be vulnerable to recent attacks abusing exposed #Docker #APIs. Our research shows that threat actors are actively targeting cloud-reliant sectors such as technology finance and healthcare:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945483563266174977) 2025-07-16 14:00:01 UTC 51.9K followers, XXX engagements "Vidar Lumma Stealer and Rhadamanthys were among the most prominent infostealer families detected in #OperationSecure. Trend Micros analysis details their role in recent campaigns and how C&C takedowns disrupt them. Get the full story here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943535730250100892) 2025-07-11 05:00:01 UTC 51.9K followers, XXX engagements "#OperationSecure resulted in XX arrests the seizure of XX criminal servers and over 216000 victim notifications. Key infostealer families Vidar Lumma Stealer and Rhadamanthys were identified and disrupted. Discover the full story:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941904982011232258) 2025-07-06 17:00:01 UTC 51.9K followers, XXX engagements "Our latest Email Threat Landscape Report uncovers the evolving tactics cybercriminals use to exploit email systems highlighting real-world attack trends high-risk sectors and advanced threat techniques. Explore the key findings:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945432077295313166) 2025-07-16 10:35:26 UTC 51.9K followers, XXX engagements "How does exposure management impact the effectiveness of Trend Micro Managed Detection and Response Our article explores this dynamic using real-world data from XXX enterprises. Be proactively prepared by reading it here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946208336791121986) 2025-07-18 14:00:00 UTC 51.9K followers, XXX engagements "Securing AI requires more than reactive defense. Trend Micro Research presents six operational steps that guide enterprises from visibility to governance. Each step addresses the unique lifecycle of AI systems. Start here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945528901494554740) 2025-07-16 17:00:10 UTC 51.9K followers, 234.7K engagements "Trend Vision One mitigates X of the #OWASP Top XX large language model risks. Backed by continuous research and integrated threat detection it provides enterprise-grade protection to secure #AI deployment at scale. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945649679447814204) 2025-07-17 01:00:06 UTC 51.9K followers, XXX engagements "Understanding your risk is the first step to reducing it. Our research across XXX enterprise organizations found that high cyber risk exposure leads to 2.6x more damage from attacks. Learn why exposure management is key. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942267366538100767) 2025-07-07 17:00:00 UTC 51.9K followers, XXX engagements "In its VENOM campaign Earth Ammit targeted the upstream segment of the #drone supply chain to gain covert access. Learn how this operation unfolded in our report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941451992880054744) 2025-07-05 11:00:00 UTC 51.9K followers, XXX engagements "Trend Vision One protects enterprises from CVE-2025-3248 exploitation attempts with network security rules threat insights and hunting queries. Gain visibility into Flodrix IOCs and secure your Langflow systems. Full protection details:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942116376933466339) 2025-07-07 07:00:01 UTC 51.9K followers, XXX engagements "The cybercriminal underground has evolved rapidly in XX years. Robert McArdle (@bobmcardle) breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series 🎥 :"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940062922316599446) 2025-07-01 15:00:19 UTC 51.9K followers, 1.2M engagements "Agentic AIs context-awareness means it can interpret environments and adapt. But this adaptability also opens doors to adversarial attacks and data poisoning. Read our detailed report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946072439919616212) 2025-07-18 05:00:00 UTC 51.9K followers, XXX engagements "CVE-2025-3248 is a critical unauthenticated RCE in Langflow now being exploited by the Flodrix #botnet. Dual C&C code injection and self-deletion make this a high-priority threat. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944079309494165644) 2025-07-12 17:00:01 UTC 51.9K followers, XXX engagements "Overprivileged containers can expose #AWS credentials through packet sniffing and API spoofing. Our research shows how attackers exploit these settings to escalate access in cloud environments. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945166468326269090) 2025-07-15 17:00:00 UTC 51.9K followers, XXX engagements "Looking ahead: Robert McArdle (@bobmcardle) shares his predictions for the cybercriminal undergrounds evolution and what blue teams should anticipate in coming years. Visit our blog to learn more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1940320137384456591) 2025-07-02 08:02:24 UTC 51.9K followers, 1.2M engagements "Mapping and seizing infostealer C&C servers enables real-time victim alerts and strategic disruption. Operation Secure shows how public-private partnerships deliver immediate and long-term results. Read the full story:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942750553701777471) 2025-07-09 01:00:01 UTC 51.9K followers, XXX engagements "50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941753984806432882) 2025-07-06 07:00:00 UTC 51.9K followers, XXX engagements "Proactive security is essential for LLM applications. Trend Vision One addresses X of OWASPs Top XX LLM risks empowering SOCs and CISOs to stay ahead of evolving threats. Explore our in-depth research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946568911329120642) 2025-07-19 13:52:48 UTC 51.9K followers, 4186 engagements "With the help of Trend Micros global threat telemetry #OperationSecure achieved a XX% removal rate of identified suspicious IP addresses disrupting infostealer malware campaigns and supporting law enforcement in XX countries. Read more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941376501414273186) 2025-07-05 06:00:01 UTC 51.9K followers, XXX engagements "BERT ransomware disables Defender firewall and UAC using PowerShell before encryption even starts. Audit privileged PowerShell use and enforce script controls now. Find proactive defense strategies here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942438452676485345) 2025-07-08 04:19:50 UTC 51.9K followers, 1621 engagements "Dive into 14+ years of global threat research motives tactics business models. Stay ahead of threat actors with Trend Micro:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943716919149838662) 2025-07-11 17:00:00 UTC 51.9K followers, XXX engagements "#AgenticAI is redefining autonomy: #AI agents now set goals make decisions and execute actions with minimal human input. Are your defenses ready for this new attack surface Discover more in our full report on the blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944441694478270766) 2025-07-13 17:00:00 UTC 51.9K followers, XXX engagements "4/5 EchoLeak proves AI-native threats need new defenses. Trend Vision One uses behavioral AI to detect hidden prompt attacks in email & collaboration tools while ZTSA inspects GenAI traffic in real time to prevent sensitive data leaks"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945054912204701809) 2025-07-15 09:36:43 UTC 51.9K followers, 50.4K engagements "Strengthen your cybersecurity posture against stored prompt injection and vector store poisoning. Trend Micro's research provides key insights for protecting AI-enabled databases. Read the full analysis:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1936740951352914155) 2025-06-22 11:00:00 UTC 51.9K followers, XXX engagements "3/5 EchoLeak introduces Scope Violation where GenAI models leak privileged info outside intended boundaries. RAG (retrieval-augmented generation) spraying means any old email or doc could become a data leak making attacks stealthy and hard to spot"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945054906722750896) 2025-07-15 09:36:41 UTC 51.9K followers, 61.2K engagements "#AI adoption is accelerating but only XX% of organizations assess AI security pre-deployment. Discover how Trend Vision One aligns with the OWASP Top XX for LLMs to close this gap. Explore our full research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946434862203670809) 2025-07-19 05:00:08 UTC 51.9K followers, XXX engagements "Trend Vision One detects new Docker-Tor crypto mining attacks. Read about the tactics and techniques used by malicious actors and learn how to defend against them. Proactive security starts here:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943928313707151507) 2025-07-12 07:00:01 UTC 51.9K followers, XXX engagements "Deepfake technology is in the hands of cybercriminals fueling a surge in AI-powered attacks from voice phishing to video-based impersonation. Our latest research analyzes the most common vectors and offers defense strategies. Explore the full report on our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943294131943416122) 2025-07-10 13:00:00 UTC 51.9K followers, XXX engagements "Protecting #AI requires continuous adaptation. Trend Vision One supports SOCs IRs and CISOs with the latest threat intelligence and best practices. Proactive security starts today:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941482226144674303) 2025-07-05 13:00:08 UTC 51.9K followers, XXX engagements "To secure AI tools alone arent enough. We built a framework that combines operational visibility risk-aware design and AI-driven response. Its built for enterprise scale and grounded in real-world threat expertise. Learn more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944351119896985673) 2025-07-13 11:00:05 UTC 51.9K followers, XXX engagements "With the help of Trend Micros global threat telemetry #OperationSecure achieved a XX% removal rate of identified suspicious IP addresses disrupting infostealer malware campaigns and supporting law enforcement in XX countries. See how intelligence drives action:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945075878465094082) 2025-07-15 11:00:01 UTC 51.9K followers, XXX engagements "What first drove @TrendMicro to launch the Underground Series Robert McArdle (@bobmcardle) discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1939953768805577147) 2025-07-01 07:46:35 UTC 51.9K followers, 529.5K engagements "Understand the AI attack surface and fortify your defenses with our new Security for AI Blueprint. Protect AI applications ensure regulatory compliance and safeguard customer trust. Download our Security for AI Blueprint for free:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941512396092100925) 2025-07-05 15:00:01 UTC 51.9K followers, XXX engagements "Embedding a proactive approach into your organizations culture is more than strategic its essential. Our research analyzes data from XXX enterprise organizations to show how exposure-led Trend Micro Managed Detection and Response enhances cyber resilience:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945438259632369765) 2025-07-16 11:00:00 UTC 51.9K followers, XXX engagements "BERT ransomwares rapid updates mean its Windows variant now uses unique encryption libraries and custom command-line flags. Update your threat intelligence feeds and YARA rules to stay on top of shifting TTPs. See our latest detection guidance:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945362762068066740) 2025-07-16 06:00:00 UTC 51.9K followers, XXX engagements "5/5 For more details and actionable tips visit our blog to read the full EchoLeak report and learn how Trend Micro is leading the charge on AI security:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945054914549371008) 2025-07-15 09:36:43 UTC 51.9K followers, XXX engagements "From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946102638774235331) 2025-07-18 07:00:00 UTC 51.9K followers, XXX engagements "The rise of #agenticAI brings unique risks: prompt injections adversarial manipulation and privilege escalation. Traditional security controls must evolve. Read our proactive recommendations in the full report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943263933625757707) 2025-07-10 11:00:00 UTC 51.9K followers, XXX engagements "AI hallucinations can lead to #slopsquatting a new supply-chain threat in #AI-powered workflows. Learn how advanced coding agents are addressing these vulnerabilities. Dive into the details in our blog:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943354621960839312) 2025-07-10 17:00:22 UTC 51.9K followers, XXX engagements "Discover how overprivileged containers in cloud environments can expose sensitive AWS credentials and lead to serious security risks. Stay ahead by securing your infrastructure effectively. Read more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943988711479243236) 2025-07-12 11:00:01 UTC 51.9K followers, XXX engagements "Cybercriminals have developed a new attack that combines Docker's remote #API with the Tor anonymity network to secretly mine cryptocurrency on victim systems. Learn how the attack works in our report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1945891247555489801) 2025-07-17 17:00:00 UTC 51.9K followers, XXX engagements "Trend Research has detected an active campaign exploiting the critical CVE-2025-3248 vulnerability to deliver the Flodrix botnet. Attackers use it to run downloader scripts on compromised Langflow servers. Proactively secure your systems. Read our full analysis:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1943671621673246721) 2025-07-11 14:00:00 UTC 51.9K followers, 1612 engagements "Cybercriminals have developed a new attack that combines Docker's remote #API with the Tor anonymity network to secretly mine cryptocurrency on victim systems. Learn how the attack works in our report:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1941542594468573592) 2025-07-05 17:00:01 UTC 51.9K followers, XXX engagements "#AI adoption is accelerating but only XX% of organizations assess AI security pre-deployment. Discover how Trend Vision One aligns with the OWASP Top XX for LLMs to close this gap. Explore our full research:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942841181798371592) 2025-07-09 07:00:08 UTC 51.9K followers, XXX engagements "Stay ahead of cyber threats. Trend Micros Cybercriminal Underground series shares over XX years of discoveries about cybercriminal motives and methods now in one easy-to-access place. Explore the reports:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944562488969760895) 2025-07-14 01:00:00 UTC 51.9K followers, XXX engagements "Trend Micro Research revealed a campaign that uses #TikTok videos to socially engineer users into deploying Vidar and StealC infostealers.Prepare your SOC with detection strategies and awareness training to counter these tactics. Read more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1939187069265289474) 2025-06-29 05:00:00 UTC 51.9K followers, XXX engagements "Our research highlights how attackers exploit overprivileged containers in cloud environments to access sensitive AWS credentials. Techniques like packet sniffing and API spoofing enable privilege escalation. Learn more:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1942448559569182954) 2025-07-08 05:00:00 UTC 51.9K followers, XXX engagements "BERT ransomware wipes shadow copies and system restore points. Protect endpoints by restricting VSSAdmin and ensuring secure backup policies. Heres what you need to know:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1944592691481682197) 2025-07-14 03:00:01 UTC 51.9K followers, 1071 engagements "As attacks evolve #SOCs must scale intelligently. We embed #AI into detection and response pipelines using schema-free telemetry and Companion AI agents to support every analyst layer. Redefine your SOC:"  [@TrendMicroRSRCH](/creator/x/TrendMicroRSRCH) on [X](/post/tweet/1946374432911458619) 2025-07-19 01:00:01 UTC 51.9K followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Trend Micro Research posts on X about $4704t, blog, #ai, bert the most. They currently have XXXXXX followers and 1698 posts still getting attention that total XXXXXXX engagements in the last XX hours.
Social category influence technology brands finance stocks countries travel destinations social networks
Social topic influence $4704t #1, blog, #ai, bert, realworld, ip, realtime, agentic, countries, soc
Top assets mentioned Microsoft Corp. (MSFT)
Top posts by engagements in the last XX hours
"Flodrix malware uses the #Langflow exploit to kill critical processes and evade forensics. Monitor for abnormal process activity and outbound connections to stay ahead. Read the research:" @TrendMicroRSRCH on X 2025-07-15 01:00:01 UTC 51.9K followers, XXX engagements
"Trend Vision One mitigates X of the #OWASP Top XX large language model risks. Backed by continuous research and integrated threat detection it provides enterprise-grade protection to secure #AI deployment at scale. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-07 05:00:06 UTC 51.9K followers, XXX engagements
"WATCH 🎬: AI hallucinations can lead to #slopsquatting a new supply-chain threat in #AI-powered workflows. Learn how advanced coding agents are addressing these vulnerabilities. Dive into the details in our blog:" @TrendMicroRSRCH on X 2025-07-08 00:05:03 UTC 51.9K followers, XXX engagements
"Looking ahead: Robert McArdle shares his predictions for the undergrounds evolution and what blue teams should anticipate in coming years. Watch the video then visit our blog to learn more:" @TrendMicroRSRCH on X 2025-07-09 17:04:21 UTC 51.9K followers, XXX engagements
"Containers with elevated privileges are a growing risk in cloud workloads. We detail how attackers extract #AWS credentials using packet sniffing and API spoofing techniques. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-18 01:00:00 UTC 51.9K followers, XXX engagements
"Based on our investigation cybercriminals initiated the attack by scanning for publicly exposed Langflow serversgathering IP addresses and open ports using tools like Shodan or FOFA. Proactive security starts with reducing exposure:" @TrendMicroRSRCH on X 2025-07-09 11:00:01 UTC 51.9K followers, XXX engagements
"As you vibe code with #AI be aware of #slopsquatting risks. Our research explores how real-time validation can prevent phantom dependencies. Learn more here:" @TrendMicroRSRCH on X 2025-07-15 05:00:12 UTC 51.9K followers, XXX engagements
"What first drove Trend Micro to launch the Underground Series Robert McArdle discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:" @TrendMicroRSRCH on X 2025-07-16 07:02:14 UTC 51.9K followers, XXX engagements
"#AI hallucinations in coding can lead to #slopsquatting threats. Learn how automated testing and human oversight can mitigate risks. Read more in our report:" @TrendMicroRSRCH on X 2025-07-19 11:00:14 UTC 51.9K followers, XXX engagements
"Proactive security is no longer optional. As deepfake threats evolve staying ahead requires both technology and awareness. Download our comprehensive report for actionable strategies to protect your organization. Full report available now:" @TrendMicroRSRCH on X 2025-07-18 02:00:00 UTC 51.9K followers, XXX engagements
"Our report reveals how #Anubis operates a flexible affiliate model with negotiable revenue splits with added monetization paths like data extortion and access sales. Understand the broader implications for your organization:" @TrendMicroRSRCH on X 2025-07-15 07:00:00 UTC 51.9K followers, XXX engagements
"How do #AI-generated phantom dependencies create openings for attackers Our research on #slopsquatting reveals the risks and solutions. Read more in our blog:" @TrendMicroRSRCH on X 2025-07-13 01:00:12 UTC 51.9K followers, XXX engagements
"Are your #AI workflows vulnerable to #slopsquatting attacks Our blog explores how AI coding assistants can hallucinate malicious package names. Learn more:" @TrendMicroRSRCH on X 2025-07-17 07:02:17 UTC 51.9K followers, XXX engagements
"Not all agentic AIs are equal. True #agenticAI features multi-step reasoning self-improvement and real-world action requiring a new security mindset. Read for more insights:" @TrendMicroRSRCH on X 2025-07-16 01:00:00 UTC 51.9K followers, XXX engagements
"How do cybercriminals think Our Cybercriminal Underground series answers this with insights from XX years of research. Thousands of pages across XX reports now available in one place. Explore:" @TrendMicroRSRCH on X 2025-07-10 14:00:00 UTC 51.9K followers, XXX engagements
"A proactive security strategy reduces the overall impact of cyberattacks. Find out which key components drive true cyber resilience in our latest report. More details here:" @TrendMicroRSRCH on X 2025-07-12 05:00:00 UTC 51.9K followers, XXX engagements
"Strengthen your cybersecurity posture against stored prompt injection and vector store poisoning. Trend Micro's research provides key insights for protecting AI-enabled databases. Read the full analysis:" @TrendMicroRSRCH on X 2025-07-02 01:00:00 UTC 51.9K followers, XXX engagements
"Why do we keep monitoring the cybercriminal underground Robert McArdle (@bobmcardle) explains how continuous intelligence gives security pros the edge in proactive defense. See the video and read the reports for insights:" @TrendMicroRSRCH on X 2025-07-03 15:00:14 UTC 51.9K followers, 698.2K engagements
"#LLMs are exposed to threats like prompt injection model theft and data poisoning. Trend Micro Research aligns with the #OWASP Top XX for LLMs and provides actionable defense strategies across the AI lifecycle. Explore the risks:" @TrendMicroRSRCH on X 2025-07-15 14:00:07 UTC 51.9K followers, XXX engagements
"New research shows that higher cyber risk exposure significantly increases the damage caused by attacks. Discover how Trend Micro Managed Detection and Response helps mitigate these risks. Read the article for more insights:" @TrendMicroRSRCH on X 2025-07-10 01:00:00 UTC 51.9K followers, XXX engagements
"Threat actors leverage #TikTok's vast reach with videos that instruct users to execute malicious commands under the guise of software activation. This highlights the importance of reinforcing security awareness. Learn more about this evolving threat:" @TrendMicroRSRCH on X 2025-07-05 14:00:00 UTC 51.9K followers, XXX engagements
"#OperationSecure an initiative helmed by @interpol_cyber with @TrendMicro as a key partner enabled law enforcement across XX countries to dismantle over 20000 malicious IPs/domains and seize XX criminal servers targeting the Asia-Pacific region. Read the full story for details:" @TrendMicroRSRCH on X 2025-07-13 07:00:01 UTC 51.9K followers, XXX engagements
"1/5 Here are the top X must-know insights from our latest EchoLeak research a zero-click exploit targeting AI assistants like Microsoft XXX Copilot. Heres what every cybersecurity professional needs to know" @TrendMicroRSRCH on X 2025-07-15 09:36:39 UTC 51.9K followers, 67.4K engagements
"Not all agentic AIs are equal. True #agenticAI features multi-step reasoning self-improvement and real-world action requiring a new security mindset. Read for more insights:" @TrendMicroRSRCH on X 2025-07-06 05:00:00 UTC 51.9K followers, XXX engagements
"How do cybercriminals think Our Cybercriminal Underground series answers this with insights from XX years of research. Thousands of pages across XX reports now available in one place. Explore:" @TrendMicroRSRCH on X 2025-07-03 09:00:00 UTC 51.9K followers, XXX engagements
"50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:" @TrendMicroRSRCH on X 2025-07-01 07:46:57 UTC 51.9K followers, XXX engagements
"Criminals are bypassing traditional KYC and authentication processes using highly realistic deepfakes built on easily available software. We break down the tactics tools and red flags SOC teams need to know right now. Get the key findings on our blog:" @TrendMicroRSRCH on X 2025-07-12 08:00:00 UTC 51.9K followers, XXX engagements
"2/5 Attackers use invisible prompt injections like hidden HTML comments to silently exfiltrate sensitive data through AI assistants" @TrendMicroRSRCH on X 2025-07-15 09:36:40 UTC 51.9K followers, 62.8K engagements
"Attackers are exploiting misconfigured Docker #APIs to gain access to containerized environments then using Tor to mask their activities while deploying crypto miners. Discover how this method works and its implications for security operations:" @TrendMicroRSRCH on X 2025-07-08 01:00:01 UTC 51.9K followers, 1897 engagements
"Dive into 14+ years of global threat research motives tactics business models. Stay ahead of threat actors with Trend Micro:" @TrendMicroRSRCH on X 2025-07-03 08:00:00 UTC 51.9K followers, XXX engagements
"#OperationSecure resulted in XX arrests the seizure of XX criminal servers and over 216000 victim notifications. Key infostealer families Vidar Lumma Stealer and Rhadamanthys were identified and disrupted. Discover the full story:" @TrendMicroRSRCH on X 2025-07-17 14:00:01 UTC 51.9K followers, XXX engagements
"The dual-threat approach of the #RaaS group #Anubis can severely damage a companys critical data by encrypting and wiping directories. Read our latest insights on its impact and defensive measures. Be proactive and learn more here:" @TrendMicroRSRCH on X 2025-07-11 01:00:00 UTC 51.9K followers, XXX engagements
"In the almost XX years we have monitored the cybercriminal underground what trends stood out the most Robert McArdle highlights surprising findings and lessons that can inform your threat hunting and defense strategies. Watch the video and visit our blog to find out more:" @TrendMicroRSRCH on X 2025-07-14 05:00:12 UTC 51.9K followers, XXX engagements
"Resource abuse is a growing concern in #LLM deployments. Trend Vision One employs rate limiting and throttling to prevent denial of service and economic losses. Implement smarter defenses:" @TrendMicroRSRCH on X 2025-07-13 14:00:09 UTC 51.9K followers, XXX engagements
"BERT ransomware disables Defender firewall and UAC using PowerShell before encryption even starts. Audit privileged PowerShell use and enforce script controls now. Find proactive defense strategies here:" @TrendMicroRSRCH on X 2025-07-18 09:00:00 UTC 51.9K followers, XXX engagements
"Why do we keep monitoring the cybercriminal underground Robert McArdle explains how continuous intelligence gives security pros the edge in proactive defense. See the video and read the reports for insights:" @TrendMicroRSRCH on X 2025-07-12 01:00:18 UTC 51.9K followers, XXX engagements
"Mapping and seizing infostealer C&C servers enables real-time victim alerts and strategic disruption. Operation Secure shows how public-private partnerships deliver immediate and long-term results. Read the full story:" @TrendMicroRSRCH on X 2025-07-18 17:00:01 UTC 51.9K followers, XXX engagements
"Proactive security is essential for LLM applications. Trend Vision One addresses X of #OWASPs Top XX LLM risks empowering SOCs and CISOs to stay ahead of evolving threats. Explore our in-depth research:" @TrendMicroRSRCH on X 2025-07-11 11:00:07 UTC 51.9K followers, XXX engagements
"#AgenticAI expands the attack surface and amplifies traditional risks like misconfigurations and unauthorized access. Layered defense strategies are a must. Get best practices from our report:" @TrendMicroRSRCH on X 2025-07-12 14:00:00 UTC 51.9K followers, XXX engagements
"The cybercriminal underground has evolved rapidly in XX years. Robert McArdle breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series:" @TrendMicroRSRCH on X 2025-07-18 11:00:21 UTC 51.9K followers, XXX engagements
"Our blog explores how overprivileged containers in cloud environments can lead to unauthorized data access and privilege escalation. Learn how to mitigate risks like packet sniffing and #API #spoofing through stronger IAM controls and network visibility:" @TrendMicroRSRCH on X 2025-07-10 07:00:00 UTC 51.9K followers, 1537 engagements
"From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:" @TrendMicroRSRCH on X 2025-07-02 04:00:00 UTC 51.9K followers, XXX engagements
"Anubis' dual-threat #ransomware capabilities and flexible affiliate programs make it a growing force in the threat landscape. Multi-layered defense and proactive monitoring are key to combating its evolving tactics. Find out more about this emerging threat here:" @TrendMicroRSRCH on X 2025-07-17 11:00:01 UTC 51.9K followers, XXX engagements
"Cybercriminals exploit Docker APIs and the Tor network to mine cryptocurrency undetected. This stealthy method targets cloud-heavy industries like technology finance and healthcare. Full details in our blog:" @TrendMicroRSRCH on X 2025-07-10 05:00:00 UTC 51.9K followers, XXX engagements
"1/6 Agenda one of 2025s most active ransomware groups is exploiting MeshAgent and Windows Subsystem for Linux (WSL) to deploy Linux payloads on Windows systems. This raises the bar for cross-platform attack sophistication" @TrendMicroRSRCH on X 2025-07-08 23:00:01 UTC 51.9K followers, XXX engagements
"50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:" @TrendMicroRSRCH on X 2025-07-16 05:00:00 UTC 51.9K followers, XXX engagements
"From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:" @TrendMicroRSRCH on X 2025-07-08 11:00:00 UTC 51.9K followers, XXX engagements
"From romance scams in Spain to enterprise fraud in Hong Kong deepfakes are being deployed in real-world attacks. Our experts analyze case studies and share guidance for building resilient proactive security frameworks. Read our report for more:" @TrendMicroRSRCH on X 2025-07-16 15:00:01 UTC 51.9K followers, XXX engagements
"The cybercriminal underground has evolved rapidly in XX years. Robert McArdle breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series:" @TrendMicroRSRCH on X 2025-07-08 14:00:15 UTC 51.9K followers, XXX engagements
"We observed attackers leveraging zstd a tool based on the #ZStandard algorithm known for strong compression and fast decompression. Learn about this technique and what to watch out for:" @TrendMicroRSRCH on X 2025-07-14 11:00:01 UTC 51.9K followers, XXX engagements
"BERT ransomware targets ESXi VMs encrypting snapshots to block recovery. Ensure regular offsite VM backups and test recovery processes for virtual infrastructure. For a full technical analysis visit our blog:" @TrendMicroRSRCH on X 2025-07-10 15:00:00 UTC 51.9K followers, XXX engagements
"Attackers exploit Python AST parsing and exec() in Langflow to run arbitrary code. Audit access controls and application logic for similar weak points. Get the full technical deep dive:" @TrendMicroRSRCH on X 2025-07-17 05:00:01 UTC 51.9K followers, 1063 engagements
"BERT ransomwares Linux variant targets server environments so dont ignore Linux endpoints. Harden SSH access and monitor for suspicious binary executions. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-11 19:00:00 UTC 51.9K followers, XXX engagements
"What first drove Trend Micro to launch the Underground Series Robert McArdle discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:" @TrendMicroRSRCH on X 2025-07-06 11:00:12 UTC 51.9K followers, XXX engagements
"Organizations that use containerized applications may be vulnerable to recent attacks abusing exposed #Docker #APIs. Our research shows that threat actors are actively targeting cloud-reliant sectors such as technology finance and healthcare:" @TrendMicroRSRCH on X 2025-07-16 14:00:01 UTC 51.9K followers, XXX engagements
"Vidar Lumma Stealer and Rhadamanthys were among the most prominent infostealer families detected in #OperationSecure. Trend Micros analysis details their role in recent campaigns and how C&C takedowns disrupt them. Get the full story here:" @TrendMicroRSRCH on X 2025-07-11 05:00:01 UTC 51.9K followers, XXX engagements
"#OperationSecure resulted in XX arrests the seizure of XX criminal servers and over 216000 victim notifications. Key infostealer families Vidar Lumma Stealer and Rhadamanthys were identified and disrupted. Discover the full story:" @TrendMicroRSRCH on X 2025-07-06 17:00:01 UTC 51.9K followers, XXX engagements
"Our latest Email Threat Landscape Report uncovers the evolving tactics cybercriminals use to exploit email systems highlighting real-world attack trends high-risk sectors and advanced threat techniques. Explore the key findings:" @TrendMicroRSRCH on X 2025-07-16 10:35:26 UTC 51.9K followers, XXX engagements
"How does exposure management impact the effectiveness of Trend Micro Managed Detection and Response Our article explores this dynamic using real-world data from XXX enterprises. Be proactively prepared by reading it here:" @TrendMicroRSRCH on X 2025-07-18 14:00:00 UTC 51.9K followers, XXX engagements
"Securing AI requires more than reactive defense. Trend Micro Research presents six operational steps that guide enterprises from visibility to governance. Each step addresses the unique lifecycle of AI systems. Start here:" @TrendMicroRSRCH on X 2025-07-16 17:00:10 UTC 51.9K followers, 234.7K engagements
"Trend Vision One mitigates X of the #OWASP Top XX large language model risks. Backed by continuous research and integrated threat detection it provides enterprise-grade protection to secure #AI deployment at scale. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-17 01:00:06 UTC 51.9K followers, XXX engagements
"Understanding your risk is the first step to reducing it. Our research across XXX enterprise organizations found that high cyber risk exposure leads to 2.6x more damage from attacks. Learn why exposure management is key. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-07 17:00:00 UTC 51.9K followers, XXX engagements
"In its VENOM campaign Earth Ammit targeted the upstream segment of the #drone supply chain to gain covert access. Learn how this operation unfolded in our report:" @TrendMicroRSRCH on X 2025-07-05 11:00:00 UTC 51.9K followers, XXX engagements
"Trend Vision One protects enterprises from CVE-2025-3248 exploitation attempts with network security rules threat insights and hunting queries. Gain visibility into Flodrix IOCs and secure your Langflow systems. Full protection details:" @TrendMicroRSRCH on X 2025-07-07 07:00:01 UTC 51.9K followers, XXX engagements
"The cybercriminal underground has evolved rapidly in XX years. Robert McArdle (@bobmcardle) breaks down key shifts in tactics tools and actor collaboration that every defender should track. Dont miss the video and the full series 🎥 :" @TrendMicroRSRCH on X 2025-07-01 15:00:19 UTC 51.9K followers, 1.2M engagements
"Agentic AIs context-awareness means it can interpret environments and adapt. But this adaptability also opens doors to adversarial attacks and data poisoning. Read our detailed report:" @TrendMicroRSRCH on X 2025-07-18 05:00:00 UTC 51.9K followers, XXX engagements
"CVE-2025-3248 is a critical unauthenticated RCE in Langflow now being exploited by the Flodrix #botnet. Dual C&C code injection and self-deletion make this a high-priority threat. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-12 17:00:01 UTC 51.9K followers, XXX engagements
"Overprivileged containers can expose #AWS credentials through packet sniffing and API spoofing. Our research shows how attackers exploit these settings to escalate access in cloud environments. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-15 17:00:00 UTC 51.9K followers, XXX engagements
"Looking ahead: Robert McArdle (@bobmcardle) shares his predictions for the cybercriminal undergrounds evolution and what blue teams should anticipate in coming years. Visit our blog to learn more:" @TrendMicroRSRCH on X 2025-07-02 08:02:24 UTC 51.9K followers, 1.2M engagements
"Mapping and seizing infostealer C&C servers enables real-time victim alerts and strategic disruption. Operation Secure shows how public-private partnerships deliver immediate and long-term results. Read the full story:" @TrendMicroRSRCH on X 2025-07-09 01:00:01 UTC 51.9K followers, XXX engagements
"50 reports. XX years. One mission: Pierce the darkness shrouding the cybercriminal underground. Equip your team with the intelligence that matters. See the series:" @TrendMicroRSRCH on X 2025-07-06 07:00:00 UTC 51.9K followers, XXX engagements
"Proactive security is essential for LLM applications. Trend Vision One addresses X of OWASPs Top XX LLM risks empowering SOCs and CISOs to stay ahead of evolving threats. Explore our in-depth research:" @TrendMicroRSRCH on X 2025-07-19 13:52:48 UTC 51.9K followers, 4186 engagements
"With the help of Trend Micros global threat telemetry #OperationSecure achieved a XX% removal rate of identified suspicious IP addresses disrupting infostealer malware campaigns and supporting law enforcement in XX countries. Read more:" @TrendMicroRSRCH on X 2025-07-05 06:00:01 UTC 51.9K followers, XXX engagements
"BERT ransomware disables Defender firewall and UAC using PowerShell before encryption even starts. Audit privileged PowerShell use and enforce script controls now. Find proactive defense strategies here:" @TrendMicroRSRCH on X 2025-07-08 04:19:50 UTC 51.9K followers, 1621 engagements
"Dive into 14+ years of global threat research motives tactics business models. Stay ahead of threat actors with Trend Micro:" @TrendMicroRSRCH on X 2025-07-11 17:00:00 UTC 51.9K followers, XXX engagements
"#AgenticAI is redefining autonomy: #AI agents now set goals make decisions and execute actions with minimal human input. Are your defenses ready for this new attack surface Discover more in our full report on the blog:" @TrendMicroRSRCH on X 2025-07-13 17:00:00 UTC 51.9K followers, XXX engagements
"4/5 EchoLeak proves AI-native threats need new defenses. Trend Vision One uses behavioral AI to detect hidden prompt attacks in email & collaboration tools while ZTSA inspects GenAI traffic in real time to prevent sensitive data leaks" @TrendMicroRSRCH on X 2025-07-15 09:36:43 UTC 51.9K followers, 50.4K engagements
"Strengthen your cybersecurity posture against stored prompt injection and vector store poisoning. Trend Micro's research provides key insights for protecting AI-enabled databases. Read the full analysis:" @TrendMicroRSRCH on X 2025-06-22 11:00:00 UTC 51.9K followers, XXX engagements
"3/5 EchoLeak introduces Scope Violation where GenAI models leak privileged info outside intended boundaries. RAG (retrieval-augmented generation) spraying means any old email or doc could become a data leak making attacks stealthy and hard to spot" @TrendMicroRSRCH on X 2025-07-15 09:36:41 UTC 51.9K followers, 61.2K engagements
"#AI adoption is accelerating but only XX% of organizations assess AI security pre-deployment. Discover how Trend Vision One aligns with the OWASP Top XX for LLMs to close this gap. Explore our full research:" @TrendMicroRSRCH on X 2025-07-19 05:00:08 UTC 51.9K followers, XXX engagements
"Trend Vision One detects new Docker-Tor crypto mining attacks. Read about the tactics and techniques used by malicious actors and learn how to defend against them. Proactive security starts here:" @TrendMicroRSRCH on X 2025-07-12 07:00:01 UTC 51.9K followers, XXX engagements
"Deepfake technology is in the hands of cybercriminals fueling a surge in AI-powered attacks from voice phishing to video-based impersonation. Our latest research analyzes the most common vectors and offers defense strategies. Explore the full report on our blog:" @TrendMicroRSRCH on X 2025-07-10 13:00:00 UTC 51.9K followers, XXX engagements
"Protecting #AI requires continuous adaptation. Trend Vision One supports SOCs IRs and CISOs with the latest threat intelligence and best practices. Proactive security starts today:" @TrendMicroRSRCH on X 2025-07-05 13:00:08 UTC 51.9K followers, XXX engagements
"To secure AI tools alone arent enough. We built a framework that combines operational visibility risk-aware design and AI-driven response. Its built for enterprise scale and grounded in real-world threat expertise. Learn more:" @TrendMicroRSRCH on X 2025-07-13 11:00:05 UTC 51.9K followers, XXX engagements
"With the help of Trend Micros global threat telemetry #OperationSecure achieved a XX% removal rate of identified suspicious IP addresses disrupting infostealer malware campaigns and supporting law enforcement in XX countries. See how intelligence drives action:" @TrendMicroRSRCH on X 2025-07-15 11:00:01 UTC 51.9K followers, XXX engagements
"What first drove @TrendMicro to launch the Underground Series Robert McArdle (@bobmcardle) discusses our original mission and why ongoing threat intelligence remains critical for security teams. Watch the video and read the full research:" @TrendMicroRSRCH on X 2025-07-01 07:46:35 UTC 51.9K followers, 529.5K engagements
"Understand the AI attack surface and fortify your defenses with our new Security for AI Blueprint. Protect AI applications ensure regulatory compliance and safeguard customer trust. Download our Security for AI Blueprint for free:" @TrendMicroRSRCH on X 2025-07-05 15:00:01 UTC 51.9K followers, XXX engagements
"Embedding a proactive approach into your organizations culture is more than strategic its essential. Our research analyzes data from XXX enterprise organizations to show how exposure-led Trend Micro Managed Detection and Response enhances cyber resilience:" @TrendMicroRSRCH on X 2025-07-16 11:00:00 UTC 51.9K followers, XXX engagements
"BERT ransomwares rapid updates mean its Windows variant now uses unique encryption libraries and custom command-line flags. Update your threat intelligence feeds and YARA rules to stay on top of shifting TTPs. See our latest detection guidance:" @TrendMicroRSRCH on X 2025-07-16 06:00:00 UTC 51.9K followers, XXX engagements
"5/5 For more details and actionable tips visit our blog to read the full EchoLeak report and learn how Trend Micro is leading the charge on AI security:" @TrendMicroRSRCH on X 2025-07-15 09:36:43 UTC 51.9K followers, XXX engagements
"From Russian forums to global networks understand the evolution of cybercrime with Trend Micros authoritative research series. Visit our research hub:" @TrendMicroRSRCH on X 2025-07-18 07:00:00 UTC 51.9K followers, XXX engagements
"The rise of #agenticAI brings unique risks: prompt injections adversarial manipulation and privilege escalation. Traditional security controls must evolve. Read our proactive recommendations in the full report:" @TrendMicroRSRCH on X 2025-07-10 11:00:00 UTC 51.9K followers, XXX engagements
"AI hallucinations can lead to #slopsquatting a new supply-chain threat in #AI-powered workflows. Learn how advanced coding agents are addressing these vulnerabilities. Dive into the details in our blog:" @TrendMicroRSRCH on X 2025-07-10 17:00:22 UTC 51.9K followers, XXX engagements
"Discover how overprivileged containers in cloud environments can expose sensitive AWS credentials and lead to serious security risks. Stay ahead by securing your infrastructure effectively. Read more:" @TrendMicroRSRCH on X 2025-07-12 11:00:01 UTC 51.9K followers, XXX engagements
"Cybercriminals have developed a new attack that combines Docker's remote #API with the Tor anonymity network to secretly mine cryptocurrency on victim systems. Learn how the attack works in our report:" @TrendMicroRSRCH on X 2025-07-17 17:00:00 UTC 51.9K followers, XXX engagements
"Trend Research has detected an active campaign exploiting the critical CVE-2025-3248 vulnerability to deliver the Flodrix botnet. Attackers use it to run downloader scripts on compromised Langflow servers. Proactively secure your systems. Read our full analysis:" @TrendMicroRSRCH on X 2025-07-11 14:00:00 UTC 51.9K followers, 1612 engagements
"Cybercriminals have developed a new attack that combines Docker's remote #API with the Tor anonymity network to secretly mine cryptocurrency on victim systems. Learn how the attack works in our report:" @TrendMicroRSRCH on X 2025-07-05 17:00:01 UTC 51.9K followers, XXX engagements
"#AI adoption is accelerating but only XX% of organizations assess AI security pre-deployment. Discover how Trend Vision One aligns with the OWASP Top XX for LLMs to close this gap. Explore our full research:" @TrendMicroRSRCH on X 2025-07-09 07:00:08 UTC 51.9K followers, XXX engagements
"Stay ahead of cyber threats. Trend Micros Cybercriminal Underground series shares over XX years of discoveries about cybercriminal motives and methods now in one easy-to-access place. Explore the reports:" @TrendMicroRSRCH on X 2025-07-14 01:00:00 UTC 51.9K followers, XXX engagements
"Trend Micro Research revealed a campaign that uses #TikTok videos to socially engineer users into deploying Vidar and StealC infostealers.Prepare your SOC with detection strategies and awareness training to counter these tactics. Read more:" @TrendMicroRSRCH on X 2025-06-29 05:00:00 UTC 51.9K followers, XXX engagements
"Our research highlights how attackers exploit overprivileged containers in cloud environments to access sensitive AWS credentials. Techniques like packet sniffing and API spoofing enable privilege escalation. Learn more:" @TrendMicroRSRCH on X 2025-07-08 05:00:00 UTC 51.9K followers, XXX engagements
"BERT ransomware wipes shadow copies and system restore points. Protect endpoints by restricting VSSAdmin and ensuring secure backup policies. Heres what you need to know:" @TrendMicroRSRCH on X 2025-07-14 03:00:01 UTC 51.9K followers, 1071 engagements
"As attacks evolve #SOCs must scale intelligently. We embed #AI into detection and response pipelines using schema-free telemetry and Companion AI agents to support every analyst layer. Redefine your SOC:" @TrendMicroRSRCH on X 2025-07-19 01:00:01 UTC 51.9K followers, XXX engagements
/creator/x::TrendMicroRSRCH