Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

![TrendMicroRSRCH Avatar](https://lunarcrush.com/gi/w:24/cr:twitter::11927342.png) Trend Micro Research [@TrendMicroRSRCH](/creator/twitter/TrendMicroRSRCH) on x 51.9K followers
Created: 2025-07-22 07:00:00 UTC

Criminals are bypassing traditional KYC and authentication processes using highly realistic deepfakes built on easily available software. We break down the tactics, tools, and red flags SOC teams need to know right now. 

Get the key findings on our blog: ⬇️


XXX engagements

![Engagements Line Chart](https://lunarcrush.com/gi/w:600/p:tweet::1947552188831539671/c:line.svg)

**Related Topics**
[$4704t](/topic/$4704t)

[Post Link](https://x.com/TrendMicroRSRCH/status/1947552188831539671)

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

TrendMicroRSRCH Avatar Trend Micro Research @TrendMicroRSRCH on x 51.9K followers Created: 2025-07-22 07:00:00 UTC

Criminals are bypassing traditional KYC and authentication processes using highly realistic deepfakes built on easily available software. We break down the tactics, tools, and red flags SOC teams need to know right now.

Get the key findings on our blog: ⬇️

XXX engagements

Engagements Line Chart

Related Topics $4704t

Post Link

post/tweet::1947552188831539671
/post/tweet::1947552188831539671