Summary: 2025/04/17 17:06
First reported date: 2017/09/19
Inquiry period : 2025/03/18 17:05 ~ 2025/04/17 17:05 (1 months), 89 search results
전 기간대비 42% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Supply chain attack Malware supply Software 입니다.
공격기술 RCE Downloader Hijacking 도 새롭게 확인됩니다.
기관 및 기업 Coinbase Kaspersky Oracle Japan France 도 새롭게 확인됩니다.
기타 KASAP CVSS Attacks CVE Java 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Downstream Security: NIST & C-SCRM
ㆍ 2025/04/17 What's happening with MITRE and the CVE program uncertainty
ㆍ 2025/04/16 The cybersecurity job market is complicated: 3 key insights
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Supply chain | 89 | ▲ 37 (42%) |
2 | attack | 51 | ▲ 18 (35%) |
3 | Malware | 51 | ▲ 22 (43%) |
4 | supply | 29 | ▲ 14 (48%) |
5 | Software | 29 | ▲ 10 (34%) |
6 | Update | 27 | ▲ 17 (63%) |
7 | target | 25 | ▲ 5 (20%) |
8 | Remote Code Execution | 23 | ▲ 5 (22%) |
9 | chain | 22 | ▲ 11 (50%) |
10 | Exploit | 22 | ▲ 3 (14%) |
11 | Report | 22 | ▲ 8 (36%) |
12 | GitHub | 20 | ▲ 14 (70%) |
13 | Vulnerability | 15 | ▲ 3 (20%) |
14 | Campaign | 14 | ▲ 3 (21%) |
15 | Operation | 14 | ▲ 6 (43%) |
16 | United States | 12 | ▲ 5 (42%) |
17 | Criminal | 11 | ▲ 5 (45%) |
18 | CISA | 10 | ▲ 7 (70%) |
19 | intelligence | 10 | ▼ -7 (-70%) |
20 | Advertising | 9 | ▲ 5 (56%) |
21 | malicious | 9 | ▲ 6 (67%) |
22 | AI | 8 | ▲ 1 (13%) |
23 | Phishing | 8 | ▲ 3 (38%) |
24 | Cryptocurrency | 8 | ▲ 6 (75%) |
25 | Government | 7 | - 0 (0%) |
26 | Backdoor | 7 | - 0 (0%) |
27 | Victim | 7 | ▲ 4 (57%) |
28 | Education | 6 | ▼ -6 (-100%) |
29 | Coinbase | 6 | ▲ new |
30 | RCE | 6 | ▲ new |
31 | package | 6 | ▲ 5 (83%) |
32 | Ransomware | 6 | ▼ -2 (-33%) |
33 | KASAP | 5 | ▲ new |
34 | CVSS | 5 | ▲ new |
35 | code | 5 | ▲ 2 (40%) |
36 | Microsoft | 5 | ▼ -5 (-100%) |
37 | Attacks | 5 | ▲ new |
38 | Kaspersky | 5 | ▲ new |
39 | CVE | 5 | ▲ new |
40 | Java | 4 | ▲ new |
41 | c&c | 4 | ▲ 3 (75%) |
42 | access | 4 | ▲ 1 (25%) |
43 | npm | 4 | ▲ 3 (75%) |
44 | hijack | 4 | ▲ 2 (50%) |
45 | China | 4 | ▼ -5 (-125%) |
46 | Action | 4 | ▲ new |
47 | VPN | 4 | ▲ 2 (50%) |
48 | risk | 4 | ▲ new |
49 | Password | 4 | ▲ 2 (50%) |
50 | ChatGPT | 4 | ▲ 2 (50%) |
51 | NIST | 4 | ▲ 2 (50%) |
52 | MWNEWS | 4 | ▲ 3 (75%) |
53 | Firmware | 4 | ▲ 1 (25%) |
54 | 3 | ▲ 2 (67%) | |
55 | thirdparty | 3 | ▲ new |
56 | DYEPACK | 3 | ▲ 1 (33%) |
57 | Oracle | 3 | ▲ new |
58 | 3 | ▲ 1 (33%) | |
59 | Eclypsium | 3 | ▲ new |
60 | ZeroDay | 3 | ▼ -3 (-100%) |
61 | Social Engineering | 3 | ▲ 2 (67%) |
62 | Apple | 3 | ▲ 2 (67%) |
63 | Distribution | 3 | - 0 (0%) |
64 | DarkWeb | 3 | ▲ 1 (33%) |
65 | Vawtrak | 3 | ▲ 2 (67%) |
66 | IoC | 3 | ▲ 2 (67%) |
67 | Stealer | 3 | - 0 (0%) |
68 | Trojan | 2 | ▲ 1 (50%) |
69 | race | 2 | ▲ new |
70 | Browser | 2 | - 0 (0%) |
71 | ML | 2 | ▲ new |
72 | AIML | 2 | ▲ new |
73 | Windows | 2 | - 0 (0%) |
74 | Volt Typhoon | 2 | ▲ 1 (50%) |
75 | Program | 2 | ▲ new |
76 | SpotBugs | 2 | ▲ new |
77 | Japan | 2 | ▲ new |
78 | IoT | 2 | ▲ 1 (50%) |
79 | iPhone | 2 | ▲ new |
80 | hacking | 2 | ▼ -7 (-350%) |
81 | Hardware | 2 | ▲ 1 (50%) |
82 | Tariffs | 2 | ▲ new |
83 | Europe | 2 | ▲ 1 (50%) |
84 | Targets | 2 | ▲ new |
85 | Recent | 2 | ▲ 1 (50%) |
86 | coding | 2 | ▲ new |
87 | model | 2 | ▲ 1 (50%) |
88 | France | 2 | ▲ new |
89 | arrest | 2 | ▲ new |
90 | Cloud | 2 | ▲ 1 (50%) |
91 | Critical | 2 | ▲ new |
92 | workflow | 2 | ▲ new |
93 | Downloader | 2 | ▲ new |
94 | token | 2 | ▲ new |
95 | secure | 2 | ▲ 1 (50%) |
96 | Zero Trust | 2 | ▼ -1 (-50%) |
97 | 2 | ▼ -3 (-150%) | |
98 | MFA | 2 | ▼ -2 (-100%) |
99 | Hijacking | 2 | ▲ new |
100 | Recap | 2 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
6 (42.9%) |
DYEPACK |
|
3 (21.4%) |
Vawtrak |
|
3 (21.4%) |
Trojan |
|
2 (14.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Volt Typhoon |
|
2 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Remote Code Execution |
|
23 (23.5%) |
Exploit |
|
22 (22.4%) |
Campaign |
|
14 (14.3%) |
Phishing |
|
8 (8.2%) |
Backdoor |
|
7 (7.1%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
12 (17.9%) |
CISA |
|
10 (14.9%) |
Government |
|
7 (10.4%) |
Coinbase |
|
6 (9%) |
Microsoft |
|
5 (7.5%) |
Threat info
Last 5SNS
(Total : 14)Supply chain attack Update Attacks Phishing Kaspersky Malware GitHub Ransomware RCE Android United States Victim US target hijack Advertising Report Exploit VPN Coinbase Backdoor
News
(Total : 75)Supply chain Malware attack Software target Remote Code Execution Attacker Exploit Report Update GitHub Vulnerability Operation Campaign Criminal United States intelligence CISA Cryptocurrency Advertising Government Education Victim Backdoor CVE Microsoft Coinbase CVSS Ransomware RCE China c&c Firmware ChatGPT Password NIST Java IoC Social Engineering VPN Phishing Oracle LinkedIn Twitter Stealer Apple Distribution DYEPACK hijack Vawtrak ZeroDay DarkWeb ClickFix iPhone Japan Windows Palo Alto Networks Browser Trojan Downloader Hijacking France MFA Email Zero Trust arrest hacking Volt Typhoon ESET NSA ...
No | Title | Date |
---|---|---|
1 | Downstream Security: NIST & C-SCRM - Malware.News | 2025.04.17 |
2 | What's happening with MITRE and the CVE program uncertainty - Malware.News | 2025.04.17 |
3 | The cybersecurity job market is complicated: 3 key insights - Malware.News | 2025.04.16 |
4 | From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains - The Hacker News | 2025.04.16 |
5 | ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains - TrendMicro | 2025.04.15 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | What's happening with MITRE and the CVE program uncertainty - Malware.News | 2025.04.17 |
2 | The cybersecurity job market is complicated: 3 key insights - Malware.News | 2025.04.16 |
3 | ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains - TrendMicro | 2025.04.15 |
4 | ICS Security Conference 2025 - Malware.News | 2025.04.11 |
5 | ICS Security Conference 2025 - Malware.News | 2025.04.11 |
View only the last 5 |