Summary: 2025/05/07 21:01
First reported date: 2013/05/08
Inquiry period : 2025/04/07 21:01 ~ 2025/05/07 21:01 (1 months), 6 search results
전 기간대비 83% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Shadow 입니다.
악성코드 유형 Lumma LummaStealer 도 새롭게 확인됩니다.
공격기술 Stealer 도 새롭게 확인됩니다.
기타 Malware Informationen Update Schwachstelle Spotlight 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/22 [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Darstellen falscher Informationen
ㆍ 2025/04/22 [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Offenlegung von Informationen
ㆍ 2025/04/22 Shadow downloads – How developers have become the new perimeter
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Shadow | 6 | ▲ 5 (83%) |
2 | Malware | 3 | ▲ new |
3 | Informationen | 2 | ▲ new |
4 | Update | 2 | ▲ new |
5 | Schwachstelle | 2 | ▲ new |
6 | Spotlight | 1 | ▲ new |
7 | von | 1 | ▲ new |
8 | risk | 1 | ▲ new |
9 | EASM | 1 | ▲ new |
10 | sponsored | 1 | ▲ new |
11 | Copy | 1 | ▲ new |
12 | wmic | 1 | ▲ new |
13 | Command | 1 | ▲ new |
14 | Example | 1 | ▲ new |
15 | ermöglicht | 1 | ▲ new |
16 | Artikel | 1 | ▲ new |
17 | Evolution | 1 | ▲ new |
18 | Darstellen | 1 | ▲ new |
19 | Stealer | 1 | ▲ new |
20 | Lumma | 1 | ▲ new |
21 | LummaStealer | 1 | ▲ new |
22 | How | 1 | ▲ new |
23 | great | 1 | ▲ new |
24 | MWNEWS | 1 | ▲ new |
25 | Advertising | 1 | ▲ new |
26 | Hidden | 1 | ▲ new |
27 | attack | 1 | - 0 (0%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Lumma |
|
1 (50%) |
LummaStealer |
|
1 (50%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Stealer |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
No data.
Threat info
Last 5SNS
(Total : 2)News
(Total : 4)Malware Update Lumma Advertising LummaStealer Stealer
No | Title | Date |
---|---|---|
1 | [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Offenlegung von Informationen - IT Sicherheitsnews | 2025.04.22 |
2 | [UPDATE] [mittel] shadow: Schwachstelle ermöglicht Darstellen falscher Informationen - IT Sicherheitsnews | 2025.04.22 |
3 | Shadow downloads – How developers have become the new perimeter - Malware.News | 2025.04.22 |
4 | From Shadow to Spotlight: The Evolution of LummaStealer and Its Hidden Secrets - Cybereason | 2025.04.12 |
Additional information
No | Title | Date |
---|---|---|
1 | Startup SimpleClosure Sees Boom In Giving Fellow Startups ‘Peace of Mind’ to Die - Bloomberg Technology | 2025.05.07 |
2 | Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance - Malware.News | 2025.05.07 |
3 | Uber Posts Quarterly Bookings Miss as Rideshare Growth Slows - Bloomberg Technology | 2025.05.07 |
4 | State of the Underground 2025: Key Trends Shaping Cyber Risk Today - Malware.News | 2025.05.07 |
5 | State of ransomware in 2025 - Malware.News | 2025.05.07 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | The Hidden Threat of Shadow AI - Cyber Defense Maga... | 2024.08.21 |
2 | 10 ways to prevent shadow AI disaster - CIO Security | 2024.07.08 |
3 | Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management - Security Boulevard | 2024.06.03 |
4 | Uncontrolled AI: Navigating Ethical Dilemmas and Shadow AI Risks - Security Boulevard | 2024.05.27 |
5 | How to get a handle on shadow AI - Infoworld | 2023.09.04 |
View only the last 5 |