Summary: 2025/05/04 02:18
First reported date: 2016/06/02
Inquiry period : 2025/04/04 02:18 ~ 2025/05/04 02:18 (1 months), 15 search results
전 기간대비 -127% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Linux DNS Threat Sysdig Campaign 입니다.
악성코드 유형 Cryptocurrency Miner DYEPACK CoreDN 도 새롭게 확인됩니다.
공격자 Anonymous 도 새롭게 확인됩니다.
공격기술 RCE Hijacking 도 새롭게 확인됩니다.
기관 및 기업 Fortinet 도 새롭게 확인됩니다.
기타 Blog secure Forensics 클라우드 텔레포트 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/29 9 Open source cloud security tools for 2025
ㆍ 2025/04/25 Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining
ㆍ 2025/04/24 Runtime security in a cloud-native world: Sysdig on the Risky Business Podcast
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Kubernetes | 15 | ▼ -19 (-127%) |
2 | Malware | 9 | ▼ -7 (-78%) |
3 | RCE | 8 | ▲ new |
4 | Update | 7 | ▼ -1 (-14%) |
5 | Vulnerability | 5 | ▼ -3 (-60%) |
6 | Exploit | 5 | ▼ -4 (-80%) |
7 | Linux | 5 | ▲ 1 (20%) |
8 | Advertising | 4 | ▼ -2 (-50%) |
9 | target | 3 | ▼ -4 (-133%) |
10 | DNS | 3 | ▲ 1 (33%) |
11 | Threat | 3 | ▲ 2 (67%) |
12 | Microsoft | 3 | ▼ -2 (-67%) |
13 | Report | 3 | ▼ -2 (-67%) |
14 | Sysdig | 3 | ▲ 1 (33%) |
15 | IngressNightmare | 3 | - 0 (0%) |
16 | Cryptocurrency Miner | 2 | ▲ new |
17 | Campaign | 2 | ▲ 1 (50%) |
18 | intelligence | 2 | ▼ -3 (-150%) |
19 | Blog | 2 | ▲ new |
20 | Operation | 2 | ▼ -1 (-50%) |
21 | CVSS | 2 | ▼ -2 (-100%) |
22 | GitHub | 2 | ▼ -2 (-100%) |
23 | secure | 2 | ▲ new |
24 | Fortinet | 2 | ▲ new |
25 | attack | 2 | ▼ -7 (-350%) |
26 | Forensics | 2 | ▲ new |
27 | Windows | 1 | ▼ -2 (-200%) |
28 | 클라우드 | 1 | ▲ new |
29 | 텔레포트 | 1 | ▲ new |
30 | 에이 | 1 | ▲ new |
31 | account | 1 | ▲ new |
32 | 글로벌 | 1 | ▲ new |
33 | access | 1 | ▼ -1 (-100%) |
34 | Research | 1 | ▲ new |
35 | compliance | 1 | ▲ new |
36 | release | 1 | ▲ new |
37 | nonintrusive | 1 | ▲ new |
38 | NIST | 1 | - 0 (0%) |
39 | Vawtrak | 1 | ▼ -1 (-100%) |
40 | Amazon | 1 | ▼ -2 (-200%) |
41 | c&c | 1 | ▼ -1 (-100%) |
42 | Crypto | 1 | ▲ new |
43 | Clusters | 1 | ▲ new |
44 | XDR | 1 | ▲ new |
45 | Unsecured | 1 | ▲ new |
46 | ZeroDay | 1 | - 0 (0%) |
47 | plugin | 1 | - 0 (0%) |
48 | cloud | 1 | - 0 (0%) |
49 | Risky | 1 | ▲ new |
50 | world | 1 | ▲ new |
51 | cloudnative | 1 | - 0 (0%) |
52 | EDR | 1 | ▲ new |
53 | landscape | 1 | ▲ new |
54 | pod | 1 | ▲ new |
55 | Backdoor | 1 | ▼ -1 (-100%) |
56 | Takedown | 1 | - 0 (0%) |
57 | NGINX | 1 | ▼ -5 (-500%) |
58 | Agent | 1 | ▲ new |
59 | Education | 1 | ▼ -3 (-300%) |
60 | nodelevel | 1 | ▲ new |
61 | vNode | 1 | ▲ new |
62 | LoftLabs | 1 | ▲ new |
63 | unauthenticated | 1 | - 0 (0%) |
64 | Ingress | 1 | ▼ -6 (-600%) |
65 | Host | 1 | ▲ new |
66 | se | 1 | ▲ new |
67 | controller | 1 | ▼ -3 (-300%) |
68 | available | 1 | ▲ new |
69 | Ingressnginx | 1 | - 0 (0%) |
70 | CVE | 1 | ▼ -5 (-500%) |
71 | Remote Code Execution | 1 | ▼ -14 (-1400%) |
72 | Shield | 1 | ▲ new |
73 | Docker | 1 | ▼ -2 (-200%) |
74 | RATel | 1 | ▼ -2 (-200%) |
75 | Red Hat | 1 | - 0 (0%) |
76 | Distribution | 1 | - 0 (0%) |
77 | Ope | 1 | ▲ new |
78 | Software | 1 | ▼ -3 (-300%) |
79 | Hijacking | 1 | ▲ new |
80 | Cloudflare | 1 | - 0 (0%) |
81 | hijack | 1 | - 0 (0%) |
82 | Anonymous | 1 | ▲ new |
83 | MWNEWS | 1 | ▼ -1 (-100%) |
84 | DYEPACK | 1 | ▲ new |
85 | CoreDN | 1 | ▲ new |
86 | United States | 1 | ▼ -2 (-200%) |
87 | source | 1 | ▲ new |
88 | open | 1 | ▲ new |
89 | Survey | 1 | ▲ new |
90 | tool | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Cryptocurrency Miner |
|
2 (33.3%) |
Vawtrak |
|
1 (16.7%) |
RATel |
|
1 (16.7%) |
DYEPACK |
|
1 (16.7%) |
CoreDN |
|
1 (16.7%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Anonymous |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
RCE |
|
8 (42.1%) |
Exploit |
|
5 (26.3%) |
Campaign |
|
2 (10.5%) |
Backdoor |
|
1 (5.3%) |
Remote Code Execution |
|
1 (5.3%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
3 (37.5%) |
Fortinet |
|
2 (25%) |
Amazon |
|
1 (12.5%) |
Cloudflare |
|
1 (12.5%) |
United States |
|
1 (12.5%) |
Threat info
Last 5SNS
(Total : 3)Kubernetes Update Fortinet DNS
News
(Total : 12)Kubernetes Malware RCE Update Linux Vulnerability Exploit Attacker Advertising target Microsoft Report DNS CVSS attack Campaign Forensics Cryptocurrency Miner intelligence Operation GitHub c&c Windows NIST plugin Vawtrak XDR Amazon ZeroDay EDR Takedown Backdoor RATel Docker Fortinet Remote Code Execution CVE Education Distribution United States CoreDN DYEPACK Anonymous Red Hat hijack Cloudflare Hijacking Software
No | Title | Date |
---|---|---|
1 | 9 Open source cloud security tools for 2025 - Malware.News | 2025.04.29 |
2 | Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining - Malware.News | 2025.04.25 |
3 | Runtime security in a cloud-native world: Sysdig on the Risky Business Podcast - Malware.News | 2025.04.24 |
4 | Understanding the threat landscape for Kubernetes and containerized assets - Microsoft Security Blog | 2025.04.24 |
5 | 에이클라우드, 글로벌 보안 플랫폼 ‘텔레포트’ 공식 파트너로 선정 - 데일리시큐 | 2025.04.22 |
Additional information
No | Title | Date |
---|---|---|
1 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
2 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
3 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
4 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
5 | Acadian Ambulance Seeks Dismissal of Data Breach Lawsuit - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | 9 Open source cloud security tools for 2025 - Malware.News | 2025.04.29 |
2 | Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining - Malware.News | 2025.04.25 |
3 | Understanding the threat landscape for Kubernetes and containerized assets - Microsoft Security... | 2025.04.24 |
4 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
5 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
View only the last 5 |