Summary: 2025/04/19 11:25
First reported date: 2014/05/21
Inquiry period : 2025/03/20 11:25 ~ 2025/04/19 11:25 (1 months), 35 search results
전 기간대비 43% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Red Hat Red Hat Update Linux 입니다.
악성코드 유형 DYEPACK CoreDN BlackSuit Entropy GameoverP2P Cryptocurrency Miner 도 새롭게 확인됩니다.
공격자 Anonymous DragonOK 도 새롭게 확인됩니다.
공격기술 RCE Hijacking hijack hacking 도 새롭게 확인됩니다.
기관 및 기업 Cloudflare CISA 도 새롭게 확인됩니다.
기타 NIST von Distribution Quarkus Mehrere 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 CVE wake-up call: What’s ahead after the MITRE funding fiasco
ㆍ 2025/04/17 [UPDATE] [mittel] Red Hat Enterprise Linux (mod_auth_openidc): Schwachstelle ermöglicht Offenlegung von Informationen
ㆍ 2025/04/17 [UPDATE] [mittel] Red Hat Enterprise Linux (pam): Schwachstelle ermöglicht Offenlegung von Informationen
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Red Hat | 35 | ▲ 15 (43%) |
2 | Red | 27 | ▲ 14 (52%) |
3 | Hat | 26 | ▲ 13 (50%) |
4 | Update | 22 | ▲ 10 (45%) |
5 | Linux | 16 | ▲ 10 (63%) |
6 | Enterprise | 13 | ▲ 7 (54%) |
7 | Malware | 8 | - 0 (0%) |
8 | Schwachstelle | 7 | ▲ 5 (71%) |
9 | Exploit | 5 | ▲ 3 (60%) |
10 | OpenShift | 5 | ▲ 3 (60%) |
11 | Report | 4 | ▲ 3 (75%) |
12 | Vulnerability | 4 | - 0 (0%) |
13 | Software | 4 | ▲ 2 (50%) |
14 | Schwachstellen | 4 | ▲ 2 (50%) |
15 | United States | 4 | ▲ 2 (50%) |
16 | attack | 3 | ▲ 1 (33%) |
17 | DDoS | 3 | ▲ 1 (33%) |
18 | 3 | ▲ 2 (67%) | |
19 | target | 3 | ▲ 1 (33%) |
20 | RCE | 3 | ▲ new |
21 | Advertising | 3 | - 0 (0%) |
22 | Sicherheitsnews | 3 | ▲ 2 (67%) |
23 | Zusammenfassung | 3 | ▲ 2 (67%) |
24 | taegliche | 3 | ▲ 2 (67%) |
25 | Platform | 3 | ▲ 2 (67%) |
26 | NIST | 3 | ▲ new |
27 | advisory | 3 | - 0 (0%) |
28 | von | 2 | ▲ new |
29 | Distribution | 2 | ▲ new |
30 | Quarkus | 2 | ▲ new |
31 | Microsoft | 2 | ▲ 1 (50%) |
32 | Application | 2 | - 0 (0%) |
33 | GitHub | 2 | ▲ 1 (50%) |
34 | JBoss | 2 | - 0 (0%) |
35 | DNS | 2 | ▲ 1 (50%) |
36 | Mehrere | 2 | ▲ new |
37 | intelligence | 2 | ▼ -1 (-50%) |
38 | Operation | 2 | ▲ 1 (50%) |
39 | Remote Code Execution | 2 | ▼ -1 (-50%) |
40 | 2 | ▲ 1 (50%) | |
41 | Container | 2 | ▲ 1 (50%) |
42 | Ansible | 2 | ▲ 1 (50%) |
43 | Automation | 2 | ▲ 1 (50%) |
44 | ermöglicht | 2 | ▲ new |
45 | DYEPACK | 2 | ▲ new |
46 | Hijacking | 1 | ▲ new |
47 | Cloudflare | 1 | ▲ new |
48 | Kubernetes | 1 | - 0 (0%) |
49 | Ope | 1 | ▲ new |
50 | Backdoor | 1 | ▼ -1 (-100%) |
51 | Anonymous | 1 | ▲ new |
52 | CoreDN | 1 | ▲ new |
53 | hijack | 1 | ▲ new |
54 | quantum | 1 | ▲ new |
55 | Cyber Caliphate Army | 1 | ▲ new |
56 | Data Center | 1 | - 0 (0%) |
57 | MITRE | 1 | ▲ new |
58 | CVE | 1 | - 0 (0%) |
59 | Government | 1 | - 0 (0%) |
60 | CISA | 1 | ▲ new |
61 | hacking | 1 | ▲ new |
62 | BlackSuit | 1 | ▲ new |
63 | modauthopenidc | 1 | ▲ new |
64 | pam | 1 | ▲ new |
65 | Entropy | 1 | ▲ new |
66 | randomness | 1 | ▲ new |
67 | Forensics | 1 | ▲ new |
68 | QRNG | 1 | ▲ new |
69 | random | 1 | ▲ new |
70 | QRNGs | 1 | ▲ new |
71 | Password | 1 | ▲ new |
72 | IoT | 1 | ▲ new |
73 | Cryptographic key | 1 | ▲ new |
74 | Campaign | 1 | - 0 (0%) |
75 | Firmware | 1 | ▲ new |
76 | CVSS | 1 | - 0 (0%) |
77 | XSS | 1 | ▼ -3 (-300%) |
78 | Advanced | 1 | ▲ new |
79 | und | 1 | - 0 (0%) |
80 | AV25156 | 1 | ▲ new |
81 | Python | 1 | ▲ new |
82 | Codeausführung | 1 | ▲ new |
83 | Artikel | 1 | ▲ new |
84 | zu | 1 | ▲ new |
85 | GameoverP2P | 1 | ▲ new |
86 | memory | 1 | ▲ new |
87 | variable | 1 | ▲ new |
88 | analysis | 1 | - 0 (0%) |
89 | SSA | 1 | ▲ new |
90 | function | 1 | - 0 (0%) |
91 | AV25176 | 1 | ▲ new |
92 | Cryptocurrency Miner | 1 | ▲ new |
93 | DragonOK | 1 | ▲ new |
94 | Windows | 1 | - 0 (0%) |
95 | Ubuntu | 1 | ▼ -1 (-100%) |
96 | 1 | ▼ -1 (-100%) | |
97 | Operatio | 1 | ▲ new |
98 | Satellite | 1 | ▲ new |
99 | Integration | 1 | ▲ new |
100 | Camel | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
DYEPACK |
|
2 (28.6%) |
CoreDN |
|
1 (14.3%) |
BlackSuit |
|
1 (14.3%) |
Entropy |
|
1 (14.3%) |
GameoverP2P |
|
1 (14.3%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
5 (26.3%) |
DDoS |
|
3 (15.8%) |
RCE |
|
3 (15.8%) |
Remote Code Execution |
|
2 (10.5%) |
Hijacking |
|
1 (5.3%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
4 (40%) |
Microsoft |
|
2 (20%) |
Cloudflare |
|
1 (10%) |
Government |
|
1 (10%) |
CISA |
|
1 (10%) |
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 35)Red Hat Update Linux Malware Exploit Attacker Report Vulnerability Software United States attack DDoS LinkedIn target RCE Advertising NIST Distribution Microsoft GitHub DNS intelligence Operation Remote Code Execution Twitter DYEPACK Hijacking Cloudflare Kubernetes Backdoor Anonymous CoreDN hijack Cyber Caliphate Army Data Center CVE Government CISA hacking BlackSuit Entropy Forensics Password IoT Cryptographic key Campaign Firmware CVSS XSS GameoverP2P Cryptocurrency Miner DragonOK Windows Ubuntu Google ...
No | Title | Date |
---|---|---|
1 | CVE wake-up call: What’s ahead after the MITRE funding fiasco - Malware.News | 2025.04.17 |
2 | [UPDATE] [mittel] Red Hat Enterprise Linux (mod_auth_openidc): Schwachstelle ermöglicht Offenlegung von Informationen - IT Sicherheitsnews | 2025.04.17 |
3 | [UPDATE] [mittel] Red Hat Enterprise Linux (pam): Schwachstelle ermöglicht Offenlegung von Informationen - IT Sicherheitsnews | 2025.04.17 |
4 | Quantum delivers really random numbers: How that boosts AppSec - Malware.News | 2025.04.15 |
5 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | CVE wake-up call: What’s ahead after the MITRE funding fiasco - Malware.News | 2025.04.17 |
2 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
3 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
4 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Malware.News | 2025.04.01 |
5 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Malware.News | 2025.04.01 |
View only the last 5 |