Summary: 2025/04/17 13:09
First reported date: 2014/05/13
Inquiry period : 2025/03/18 13:09 ~ 2025/04/17 13:09 (1 months), 14 search results
전 기간대비 43% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 HTTP Next stage 입니다.
기타 Remote Request Vulnerability CVE Alert 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/03/26 [UPDATE] [mittel] Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
ㆍ 2025/03/19 [NEU] [mittel] Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | HTTP | 14 | ▲ 6 (43%) |
2 | Next | 3 | ▲ 1 (33%) |
3 | stage | 3 | ▲ 1 (33%) |
4 | Remote | 3 | ▲ new |
5 | Request | 2 | ▲ new |
6 | Vulnerability | 2 | ▲ new |
7 | CVE | 2 | ▲ new |
8 | Alert | 2 | ▲ new |
9 | Varnish | 2 | ▲ new |
10 | Cache | 2 | ▲ new |
11 | Schwachstelle | 2 | ▲ new |
12 | von | 2 | ▲ new |
13 | crond | 1 | ▲ new |
14 | AV | 1 | ▲ new |
15 | opendir | 1 | ▲ new |
16 | httpstcoZOUNJmYwkc | 1 | ▲ new |
17 | Open Directory | 1 | ▲ new |
18 | VT | 1 | ▲ new |
19 | openwinsys | 1 | ▲ new |
20 | Token | 1 | ▲ new |
21 | Status | 1 | ▲ new |
22 | Codes | 1 | ▲ new |
23 | Vite | 1 | ▲ new |
24 | FUD | 1 | ▲ new |
25 | emacsbin | 1 | ▲ new |
26 | QRadar Security Suite | 1 | ▲ new |
27 | IBMi | 1 | ▲ new |
28 | Navigator | 1 | ▲ new |
29 | target | 1 | ▲ new |
30 | NetWeaver | 1 | ▲ new |
31 | Remote Code Execution | 1 | ▼ -1 (-100%) |
32 | Malware | 1 | ▼ -1 (-100%) |
33 | sign | 1 | ▲ new |
34 | MWNEWS | 1 | ▲ new |
35 | Headers | 1 | ▲ new |
36 | Sun | 1 | ▲ new |
37 | Update | 1 | ▼ -1 (-100%) |
38 | Rejetto | 1 | ▲ new |
39 | SAP | 1 | ▲ new |
40 | File | 1 | ▲ new |
41 | Server | 1 | ▲ new |
42 | Panel | 1 | ▲ new |
43 | English | 1 | ▲ new |
44 | Polish | 1 | ▲ new |
45 | available | 1 | ▲ new |
46 | unauthenticated | 1 | ▲ new |
47 | thorscanner | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Remote Code Execution |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 8)CVE Vulnerability target Open Directory opendir Attacker
News
(Total : 6)QRadar Security Suite Remote Code Execution Update Malware
No | Title | Date |
---|---|---|
1 | [webapps] IBMi Navigator 7.5 - HTTP Security Token Bypass - Exploit-DB.com | 2025.04.15 |
2 | [remote] SAP NetWeaver - 7.53 - HTTP Request Smuggling - Exploit-DB.com | 2025.04.02 |
3 | [webapps] Rejetto HTTP File Server 2.3m - Remote Code Execution (RCE) - Exploit-DB.com | 2025.03.28 |
4 | [UPDATE] [mittel] Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen - IT Sicherheitsnews | 2025.03.26 |
5 | Let's Talk About HTTP Headers., (Sun, Mar 23rd) - Malware.News | 2025.03.24 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | HTTP/3 is everywhere but nowhere - Malware.News | 2025.03.13 |
2 | HTTP/3 is everywhere but nowhere - Malware.News | 2025.03.13 |
3 | HTTP/3 is everywhere but nowhere - Malware.News | 2025.03.13 |
4 | HTTP/3 is everywhere but nowhere - Malware.News | 2025.03.13 |
5 | HTTP/3 is everywhere but nowhere - Malware.News | 2025.03.13 |
View only the last 5 |
Level | Description |
---|---|
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |