Cyber Threat Trend (Top 100)

detection / related keywords : 2025-04-02 ~ 2025-05-01 (29 days), 14 search results

Trend graph by period

Cloud

detectionmalwareattackoperationadvertisingattackerreportupdatesplunktargetactivityintelligencegithubrceratelcampaignlinkedinpowershellvawtrakchatgptred teamsoftwarewindowssocunited statesavailablegoogleexploitedrengineeringvictimiocthreatgameoverp2pblue teamresponselinuxquerystateuserrealincidentforensicsnetworkalertgoodtopevidenceprevalentllminvestigativecisaemaildocumentationaisolarmarkerclopgovernmentidentityhunthuntressfalseelasticvulnerabilityvariouskubernetesuacstealersysdigltdivgtfalcopluginnisttrickbotremote code executionesetoktamicrosoftc&crussiacyberespionagecaretohomeblack bastaaugmentspresencetimerulecyber kill chainransomwaredistributioncopy-pastekasperskyqakbotlojungianunconscioustwitterentropyopportunity

List (Top 100)

# Trend Count
1detection 14 ▼ -8 (-57%)
2malware 9 ▼ -6 (-67%)
3attack 9 ▲ 3 (33%)
4operation 7 ▲ 5 (71%)
5advertising 5 ▲ 2 (40%)
6attacker 5 - 0 (0%)
7report 5 ▼ -1 (-20%)
8update 4 ▲ 2 (50%)
9splunk 4 ▲ 2 (50%)
10target 4 ▼ -1 (-25%)
11activity 4 ▲ new
12intelligence 4 - 0 (0%)
13github 4 ▼ -4 (-100%)
14rce 4 ▲ new
15ratel 4 ▲ 2 (50%)
16campaign 3 - 0 (0%)
17linkedin 3 ▲ 1 (33%)
18powershell 3 ▲ 2 (67%)
19vawtrak 3 ▲ 1 (33%)
20chatgpt 3 ▲ 2 (67%)
21red team 3 - 0 (0%)
22software 3 - 0 (0%)
23windows 3 ▲ 1 (33%)
24soc 3 ▲ new
25united states 3 ▼ -3 (-100%)
26available 2 ▲ new
27google 2 - 0 (0%)
28exploit 2 ▼ -5 (-250%)
29edr 2 ▲ 1 (50%)
30engineering 2 ▲ 1 (50%)
31victim 2 - 0 (0%)
32ioc 2 ▲ 1 (50%)
33threat 2 ▼ -2 (-100%)
34gameoverp2p 2 ▲ 1 (50%)
35blue team 2 ▲ new
36response 2 ▲ 1 (50%)
37linux 2 ▼ -2 (-100%)
38query 2 ▲ new
39state 1 ▲ new
40user 1 ▲ new
41real 1 ▲ new
42incident 1 ▲ new
43forensics 1 ▲ new
44network 1 ▲ new
45alert 1 ▲ new
46good 1 ▲ new
47top 1 ▲ new
48evidence 1 ▲ new
49prevalent 1 ▲ new
50llm 1 ▲ new
51investigative 1 ▲ new
52cisa 1 ▲ new
53email 1 ▼ -2 (-200%)
54documentation 1 ▲ new
55ai 1 - 0 (0%)
56solarmarker 1 ▲ new
57clop 1 ▲ new
58government 1 ▲ new
59identity 1 - 0 (0%)
60hunt 1 ▲ new
61huntress 1 ▲ new
62false 1 ▲ new
63elastic 1 ▲ new
64vulnerability 1 ▼ -6 (-600%)
65various 1 ▲ new
66kubernetes 1 ▲ new
67uac 1 ▲ new
68stealer 1 ▼ -1 (-100%)
69sysdig 1 ▲ new
70ltdivgt 1 ▲ new
71falco 1 ▲ new
72plugin 1 ▲ new
73nist 1 ▲ new
74trickbot 1 ▲ new
75remote code execution 1 ▼ -12 (-1200%)
76eset 1 ▲ new
77okta 1 ▲ new
78microsoft 1 ▼ -1 (-100%)
79c&c 1 - 0 (0%)
80russia 1 ▲ new
81cyberespionage 1 ▲ new
82careto 1 ▲ new
83home 1 ▲ new
84black basta 1 ▲ new
85augments 1 ▲ new
86presence 1 ▲ new
87time 1 ▲ new
88rule 1 ▲ new
89cyber kill chain 1 ▲ new
90ransomware 1 ▲ new
91distribution 1 ▲ new
92copy-paste 1 ▲ new
93kaspersky 1 ▲ new
94qakbot 1 ▲ new
95lo 1 ▲ new
96jungian 1 ▲ new
97unconscious 1 ▲ new
98twitter 1 ▲ new
99entropy 1 ▲ new
100opportunity 1 ▲ new

If you select keyword, you can check detailed information.