Summary: 2025/04/17 13:09

First reported date: 2014/05/13
Inquiry period : 2025/03/18 13:09 ~ 2025/04/17 13:09 (1 months), 14 search results

전 기간대비 43% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
HTTP Next stage 입니다.
기타 Remote Request Vulnerability CVE Alert 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/03/26 [UPDATE] [mittel] Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
    ㆍ 2025/03/19 [NEU] [mittel] Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1HTTP 14 ▲ 6 (43%)
2Next 3 ▲ 1 (33%)
3stage 3 ▲ 1 (33%)
4Remote 3 ▲ new
5Request 2 ▲ new
6Vulnerability 2 ▲ new
7CVE 2 ▲ new
8Alert 2 ▲ new
9Varnish 2 ▲ new
10Cache 2 ▲ new
11Schwachstelle 2 ▲ new
12von 2 ▲ new
13crond 1 ▲ new
14AV 1 ▲ new
15opendir 1 ▲ new
16httpstcoZOUNJmYwkc 1 ▲ new
17Open Directory 1 ▲ new
18VT 1 ▲ new
19openwinsys 1 ▲ new
20Token 1 ▲ new
21Status 1 ▲ new
22Codes 1 ▲ new
23Vite 1 ▲ new
24FUD 1 ▲ new
25emacsbin 1 ▲ new
26QRadar Security Suite 1 ▲ new
27IBMi 1 ▲ new
28Navigator 1 ▲ new
29target 1 ▲ new
30NetWeaver 1 ▲ new
31Remote Code Execution 1 ▼ -1 (-100%)
32Malware 1 ▼ -1 (-100%)
33sign 1 ▲ new
34MWNEWS 1 ▲ new
35Headers 1 ▲ new
36Sun 1 ▲ new
37Update 1 ▼ -1 (-100%)
38Rejetto 1 ▲ new
39SAP 1 ▲ new
40File 1 ▲ new
41Server 1 ▲ new
42Panel 1 ▲ new
43English 1 ▲ new
44Polish 1 ▲ new
45available 1 ▲ new
46unauthenticated 1 ▲ new
47thorscanner 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Remote Code Execution
1 (100%)
Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Threat info
Last 5

Additional information

No Title Date
1HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
2HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
3HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
4HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
5HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
View only the last 5
Level Description
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Potentially malicious URLs were found in the process memory dump
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.