Summary: 2025/04/17 13:19

First reported date: 2008/11/30
Inquiry period : 2025/03/18 13:19 ~ 2025/04/17 13:19 (1 months), 229 search results

전 기간대비 -10% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Malware attack Report intelligence target 입니다.
기관 및 기업 ESET 도 새롭게 확인됩니다.
기타 April Critical AI leak fake 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
    ㆍ 2025/04/16 Threat Intelligence Snapshot: Week 16, 2025
    ㆍ 2025/04/16 Threat Intelligence Snapshot: Week 15, 2025

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1threat 229 ▼ -24 (-10%)
2Malware 84 ▲ 18 (21%)
3attack 55 ▲ 10 (18%)
4Report 51 ▲ 12 (24%)
5intelligence 49 ▲ 16 (33%)
6actor 47 ▼ -51 (-109%)
7target 42 ▲ 10 (24%)
8Exploit 41 ▲ 10 (24%)
9Campaign 37 - 0 (0%)
10Update 28 ▲ 19 (68%)
11Criminal 24 ▲ 11 (46%)
12Phishing 24 ▼ -4 (-17%)
13Operation 23 ▲ 10 (43%)
14United States 23 - 0 (0%)
15Email 22 ▲ 2 (9%)
16China 21 ▲ 7 (33%)
17Ransomware 20 ▲ 1 (5%)
18DarkWeb 19 ▼ -9 (-47%)
19Microsoft 19 ▲ 10 (53%)
20Vulnerability 17 ▲ 10 (59%)
21Remote Code Execution 16 ▲ 2 (13%)
22Windows 16 ▲ 8 (50%)
23Kaspersky 14 ▼ -4 (-29%)
24Google 14 ▲ 10 (71%)
25Daily 12 ▲ 4 (33%)
26Russia 12 ▼ -1 (-8%)
27April 12 ▲ new
28Victim 12 ▼ -2 (-17%)
29Browser 11 ▲ 7 (64%)
30Android 11 ▲ 7 (64%)
31ZeroDay 11 ▲ 8 (73%)
32Password 10 ▲ 2 (20%)
33Advertising 10 ▼ -7 (-70%)
34MWNEWS 10 ▲ 5 (50%)
35Data 10 ▼ -16 (-160%)
36Government 9 ▼ -4 (-44%)
37Alleged 9 ▲ 1 (11%)
38Software 8 ▲ 2 (25%)
39March 8 ▲ 2 (25%)
40Europe 8 - 0 (0%)
41Sale 8 ▲ 7 (88%)
42North Korea 8 - 0 (0%)
43Education 8 ▲ 5 (63%)
44hijack 7 ▲ 6 (86%)
45payment 7 ▲ 3 (43%)
46alert 7 ▲ 5 (71%)
47access 7 ▼ -17 (-243%)
48group 7 ▲ 2 (29%)
49Fortinet 6 ▲ 3 (50%)
50Backdoor 6 ▼ -2 (-33%)
51hacking 6 ▲ 3 (50%)
52Malicious 6 ▲ 4 (67%)
53GitHub 6 ▲ 5 (83%)
54Dark 6 ▲ 2 (33%)
55Cloudflare 6 ▲ 5 (83%)
56Distribution 6 ▲ 4 (67%)
57RCE 6 ▲ 5 (83%)
58Claims 5 ▼ -54 (-1080%)
59Critical 5 ▲ new
60Social Engineering 5 ▼ -1 (-20%)
61IoC 5 ▼ -1 (-20%)
62AI 5 ▲ new
63Breach 5 ▼ -1 (-20%)
64Banking 5 ▼ -4 (-80%)
65WordPress 5 ▲ 3 (60%)
66Snapshot 5 ▲ 2 (40%)
67leak 4 ▲ new
68VPN 4 ▼ -2 (-50%)
69Cryptocurrency 4 ▼ -2 (-50%)
70Trojan 4 - 0 (0%)
71amp 4 ▲ 2 (50%)
72Use 4 ▲ 2 (50%)
73Russian 4 ▲ 1 (25%)
74Mandiant 4 ▲ 2 (50%)
75Team 4 ▲ 2 (50%)
76fake 4 ▲ new
77Trend 4 ▲ 1 (25%)
78Intel 4 ▲ new
79Africa 4 ▲ 3 (75%)
80arrest 4 ▲ new
81Smishing 4 ▲ 2 (50%)
82INTERPOLs 4 ▲ new
83case 4 ▲ 3 (75%)
84African 4 ▲ new
85domain 3 ▲ 2 (67%)
86YouTube 3 ▲ new
87Reading 3 ▲ 2 (67%)
88Cloud 3 ▼ -1 (-33%)
89Linux 3 ▲ 2 (67%)
90threatintel 3 ▲ new
91Research 3 ▼ -2 (-67%)
92Takedown 3 ▲ 2 (67%)
93Future 3 ▲ new
94page 3 ▲ new
95ESET 3 ▲ new
96Chrome 3 ▲ new
97DNS 3 ▲ new
98EncryptHub 3 - 0 (0%)
99Severity 3 ▲ new
100North 3 ▲ 1 (33%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
20 (48.8%)
Trojan
4 (9.8%)
ViperSoftX
3 (7.3%)
Viper
3 (7.3%)
Vawtrak
3 (7.3%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
41 (26.1%)
Campaign
37 (23.6%)
Phishing
24 (15.3%)
Remote Code Execution
16 (10.2%)
hijack
7 (4.5%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
23 (12.7%)
China
21 (11.6%)
Microsoft
19 (10.5%)
Kaspersky
14 (7.7%)
Google
14 (7.7%)
Threat info
Last 5

SNS

(Total : 147)
  Total keyword

Report Attack Malware intelligence target Exploit DarkWeb Email Campaign Kaspersky Criminal Update Russia Operation China Phishing Microsoft North Korea United States Password Ransomware Google Vulnerability Windows arrest Africa hacking Remote Code Execution payment Education Browser dprk Advertising Fortinet Proofpoint Check Point Victim Android Cloudflare WordPress Attacker Government VPN CrowdStrike Cryptocurrency CISA US Mandiant NetWireRC Distribution RAT ...

No Title Date
1Cyber_OSINT @Cyber_O51NT
The Sysdig Threat Research Team reported that UNC5174 has evolved its cyber warfare tactics in China, transitioning from SNOWLIGHT to the sophisticated VShell tool for espionage and access brokering. #CyberSecurity #UNC5174 https://t.co/BUUv0rugdi
2025.04.16
2ANY.RUN @anyrun_app
???? Effective threat detection depends on Indicators of Compromise, Attack & Behavior. But do you know the difference between them? Find out and see how you can use them to enrich alerts, gain threat context, and perform malware hunting ???? https://t.co/9QddtlZwEz
2025.04.16
3lazarusholic @lazarusholic
"Monthly Threat Actor Group Intelligence Report, February 2025 (ENG)" published by @nshcthreatrecon. #SectorA, #SectorA01, #SectorA02, #SectorA05 SectorA07, #Trend, #DPRK, #CTI https://t.co/R6KkS6Emjb
2025.04.16
4Virus Bulletin @virusbtn
The Cyber Threat Alliance is once again partnering the Virus Bulletin conference Threat Intelligence Practitioners Summit (TIPS) and is seeking proposals for presentations. The theme for the VB2025 TIPS track is Community Driven Threat Defense. Details at: https://t.co/m3AgmGgsEW https://t.co/aPUW2D
2025.04.16
5Microsoft Threat Intelligence @MsftSecIntel
@sherrod_im In the case of the Russian threat actor Star Blizzard, while their campaigns have always been focused on email credential theft, the actor has persistently introduced new techniques to avoid detection, and either modified or abandoned them once they become publicly known.
2025.04.16

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.