Summary: 2025/04/17 10:48
First reported date: 2010/05/28
Inquiry period : 2025/03/18 10:48 ~ 2025/04/17 10:48 (1 months), 115 search results
전 기간대비 38% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 CVE Vulnerability Exploit Update Malware 입니다.
공격기술 hijack 도 새롭게 확인됩니다.
기타 program Tomcat Kubernetes CrushFTP Ingress 등 신규 키워드도 확인됩니다.
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Save our CVE! Last minute rescue for critical cybersecurity service
ㆍ 2025/04/17 What's happening with MITRE and the CVE program uncertainty
ㆍ 2025/04/17 CISA funds CVE program in the 11th hour of contract with MITRE
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | CVE | 115 | ▲ 44 (38%) |
2 | Vulnerability | 114 | ▲ 43 (38%) |
3 | Exploit | 47 | ▲ 14 (30%) |
4 | Update | 36 | ▲ 17 (47%) |
5 | Malware | 35 | ▲ 12 (34%) |
6 | Remote Code Execution | 25 | ▲ 8 (32%) |
7 | CVSS | 23 | ▲ 4 (17%) |
8 | Report | 17 | ▲ 7 (41%) |
9 | Critical | 16 | ▲ 9 (56%) |
10 | CISA | 16 | ▲ 7 (44%) |
11 | Alert | 14 | ▲ 6 (43%) |
12 | attack | 14 | ▼ -5 (-36%) |
13 | Software | 14 | ▲ 8 (57%) |
14 | rce | 11 | ▲ 8 (73%) |
15 | Apache | 11 | ▲ 10 (91%) |
16 | program | 10 | ▲ new |
17 | ZeroDay | 10 | ▼ -1 (-10%) |
18 | intelligence | 9 | ▲ 1 (11%) |
19 | Windows | 9 | ▼ -1 (-11%) |
20 | Flaw | 9 | ▲ 8 (89%) |
21 | ThreatProtection | 8 | ▲ 7 (88%) |
22 | Tomcat | 8 | ▲ new |
23 | target | 8 | ▼ -6 (-75%) |
24 | MITRE | 8 | ▲ 7 (88%) |
25 | Operation | 7 | ▲ 1 (14%) |
26 | GitHub | 7 | ▲ 6 (86%) |
27 | Java | 7 | ▲ 5 (71%) |
28 | NortonLifeLock | 7 | ▲ 6 (86%) |
29 | Government | 7 | ▲ 5 (71%) |
30 | Kubernetes | 7 | ▲ new |
31 | MWNEWS | 6 | ▲ 3 (50%) |
32 | CrushFTP | 6 | ▲ new |
33 | Fortinet | 6 | ▲ 4 (67%) |
34 | wild | 6 | ▲ 4 (67%) |
35 | access | 6 | ▲ 3 (50%) |
36 | Ingress | 5 | ▲ new |
37 | Microsoft | 5 | ▼ -5 (-100%) |
38 | hacking | 5 | ▲ 3 (60%) |
39 | PoC | 5 | ▲ 1 (20%) |
40 | securityaffairs | 5 | ▲ 4 (80%) |
41 | 5 | ▲ 2 (40%) | |
42 | Advertising | 5 | - 0 (0%) |
43 | Supply chain | 5 | ▲ new |
44 | FortiGate | 5 | ▲ new |
45 | SHODAN | 5 | ▲ 4 (80%) |
46 | Code | 4 | ▲ 3 (75%) |
47 | Middleware | 4 | ▲ new |
48 | amp | 3 | ▲ 2 (67%) |
49 | Exploitation | 3 | ▲ 2 (67%) |
50 | Campaign | 3 | ▼ -1 (-33%) |
51 | Backdoor | 3 | ▲ 2 (67%) |
52 | Ivanti | 3 | ▲ 2 (67%) |
53 | contract | 3 | ▲ new |
54 | DDoS | 3 | ▲ 1 (33%) |
55 | Cisco | 3 | ▼ -1 (-33%) |
56 | Nextjs | 3 | ▲ new |
57 | Backup | 3 | ▲ 2 (67%) |
58 | NGINX | 3 | ▲ new |
59 | Password | 3 | ▲ new |
60 | funding | 3 | ▲ new |
61 | Remote | 3 | ▼ -1 (-33%) |
62 | bypass | 2 | ▲ 1 (50%) |
63 | httpstcopbHM | 2 | ▲ new |
64 | ingressnginx | 2 | ▲ new |
65 | camel | 2 | ▲ 1 (50%) |
66 | Gladinet | 2 | ▲ new |
67 | Telegram | 2 | ▲ new |
68 | Chrome | 2 | ▲ new |
69 | Old | 2 | ▲ new |
70 | hijack | 2 | ▲ new |
71 | Unauthenticated | 2 | ▲ 1 (50%) |
72 | HTTP | 2 | ▲ new |
73 | WordPress | 2 | ▲ 1 (50%) |
74 | plugin | 2 | ▲ new |
75 | cve2025 | 2 | ▲ new |
76 | injection | 2 | ▲ 1 (50%) |
77 | file | 2 | ▲ 1 (50%) |
78 | vulnerable | 2 | - 0 (0%) |
79 | Vite | 2 | ▲ new |
80 | Arbitrary | 2 | ▼ -2 (-100%) |
81 | SSRF | 2 | ▲ new |
82 | Firefox | 2 | ▲ new |
83 | href | 2 | ▲ new |
84 | Smart | 2 | ▲ new |
85 | Authentication | 2 | - 0 (0%) |
86 | overflow | 2 | ▲ 1 (50%) |
87 | Replication | 2 | ▲ 1 (50%) |
88 | session | 2 | ▲ new |
89 | Zscaler | 2 | ▲ new |
90 | Veeam | 2 | ▲ new |
91 | VPN | 2 | ▲ new |
92 | js | 2 | ▲ new |
93 | Mandiant | 2 | ▲ 1 (50%) |
94 | ESET | 2 | - 0 (0%) |
95 | UNIX | 2 | ▲ new |
96 | Ransomware | 2 | ▲ 1 (50%) |
97 | Victim | 2 | ▼ -2 (-100%) |
98 | WAF | 2 | ▲ new |
99 | Takedown | 2 | - 0 (0%) |
100 | Next | 2 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
2 (50%) |
MeshAgent |
|
1 (25%) |
Trojan |
|
1 (25%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
UNC5221 |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
47 (46.5%) |
Remote Code Execution |
|
25 (24.8%) |
rce |
|
11 (10.9%) |
hacking |
|
5 (5%) |
Campaign |
|
3 (3%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
CISA |
|
16 (33.3%) |
Government |
|
7 (14.6%) |
Fortinet |
|
6 (12.5%) |
Microsoft |
|
5 (10.4%) |
|
5 (10.4%) |
Threat info
Last 5SNS
(Total : 71)CVE Vulnerability Exploit Update Attacker CVSS Remote Code Execution Windows ZeroDay hacking Malware rce Report CISA SHODAN Fortinet attack PoC target Microsoft Chrome Telegram plugin WordPress SSRF hijack Kubernetes Google WhatsApp Firefox Docker MeshAgent Email ...
News
(Total : 44)Vulnerability CVE Malware Exploit Update Remote Code Execution CVSS Attacker Software Report CISA attack intelligence Government Operation GitHub RCE Java target Advertising Kubernetes Supply chain ZeroDay DDoS Windows Microsoft Password PoC Google Backdoor Fortinet VPN LinkedIn Campaign Cisco Takedown SHODAN UNIX Victim ESET Ransomware YouTube UNC5221 취약점 Dropper Webshell Trojan Mandiant Linux China IoC WinRAR Europe ...
No | Title | Date |
---|---|---|
1 | Save our CVE! Last minute rescue for critical cybersecurity service - Malware.News | 2025.04.17 |
2 | What's happening with MITRE and the CVE program uncertainty - Malware.News | 2025.04.17 |
3 | CISA funds CVE program in the 11th hour of contract with MITRE - Malware.News | 2025.04.17 |
4 | CISA reverses course, extends MITRE CVE contract - CyberScoop | 2025.04.16 |
5 | MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’ - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Save our CVE! Last minute rescue for critical cybersecurity service - Malware.News | 2025.04.17 |
2 | What's happening with MITRE and the CVE program uncertainty - Malware.News | 2025.04.17 |
3 | CISA funds CVE program in the 11th hour of contract with MITRE - Malware.News | 2025.04.17 |
4 | CISA reverses course, extends MITRE CVE contract - CyberScoop | 2025.04.16 |
5 | MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’ - Malware.News | 2025.04.16 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CVE MS-MSDT AntiDebug AntiVM PNG Format MSOffice File JPEG Format | f6febdcc05cc9e04e4119c83e1afa2c8 | 30083 | 2022.08.02 |
2 | ![]() Formbook CVE MS-MSDT Word 2007 file format(docx) | 730768c4f029608adf0032e95e8e8a1d | 29851 | 2022.07.26 |
3 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | cdd33ffa502cbffec6e64c4574846a89 | 29852 | 2022.07.26 |
4 | ![]() CVE MS-MSDT AntiDebug AntiVM MSOffice File | 465585177a642d88295d7f0a55b8984c | 29868 | 2022.07.26 |
5 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | e7bde7d2b74218b4faf98d5f45b86593 | 29669 | 2022.07.20 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 29 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |