Summary: 2025/04/19 13:14
First reported date: 2013/07/15
Inquiry period : 2025/03/20 13:13 ~ 2025/04/19 13:13 (1 months), 8 search results
전 기간대비 25% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Using 입니다.
공격기술 Remote Code Execution Exploit Phishing Smishing 도 새롭게 확인됩니다.
기관 및 기업 United States Europe Apple 도 새롭게 확인됩니다.
기타 AI center Zero Trust Magic Smoke 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/15 Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval
ㆍ 2025/04/07 Why USB-C Splitters Can Cause Magic Smoke Release
ㆍ 2025/04/01 Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Using | 8 | ▲ 2 (25%) |
2 | AI | 2 | ▲ new |
3 | center | 1 | ▲ new |
4 | Zero Trust | 1 | ▲ new |
5 | Magic | 1 | ▲ new |
6 | Smoke | 1 | ▲ new |
7 | Release | 1 | ▲ new |
8 | Dark | 1 | ▲ new |
9 | Reading | 1 | ▲ new |
10 | ThirdParty | 1 | ▲ new |
11 | ID | 1 | ▲ new |
12 | Linux | 1 | ▲ new |
13 | United States | 1 | ▲ new |
14 | binary | 1 | ▲ new |
15 | Kernel | 1 | ▲ new |
16 | Modules | 1 | ▲ new |
17 | Education | 1 | ▲ new |
18 | intelligence | 1 | ▲ new |
19 | Europe | 1 | ▲ new |
20 | Meta | 1 | ▲ new |
21 | Resumes | 1 | ▲ new |
22 | USBC | 1 | ▲ new |
23 | iMessage | 1 | ▲ new |
24 | RCS | 1 | ▲ new |
25 | Remote Code Execution | 1 | ▲ new |
26 | Automated | 1 | ▲ new |
27 | Zero | 1 | ▲ new |
28 | Day | 1 | ▲ new |
29 | Initiative | 1 | ▲ new |
30 | MindshaRE | 1 | ▲ new |
31 | Vulnerability | 1 | ▲ new |
32 | Microsoft | 1 | - 0 (0%) |
33 | Exploit | 1 | ▲ new |
34 | Firmware | 1 | ▲ new |
35 | Ring | 1 | ▲ new |
36 | opensource | 1 | ▲ new |
37 | Android | 1 | ▲ new |
38 | Phishing | 1 | ▲ new |
39 | Smishing | 1 | ▲ new |
40 | Apple | 1 | ▲ new |
41 | target | 1 | ▲ new |
42 | Lucid | 1 | ▲ new |
43 | PhaaS | 1 | ▲ new |
44 | Training | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Remote Code Execution |
|
1 (25%) |
Exploit |
|
1 (25%) |
Phishing |
|
1 (25%) |
Smishing |
|
1 (25%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
1 (25%) |
Europe |
|
1 (25%) |
Microsoft |
|
1 (25%) |
Apple |
|
1 (25%) |
Threat info
Last 5SNS
(Total : 2)News
(Total : 6)Linux Education intelligence Europe United States target Apple Smishing Phishing Android Firmware Remote Code Execution Exploit Microsoft Vulnerability Training
No | Title | Date |
---|---|---|
1 | Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval - The Hacker News | 2025.04.15 |
2 | Learning Linux Kernel Modules Using COM Binary Support - Hackaday | 2025.04.13 |
3 | Why USB-C Splitters Can Cause Magic Smoke Release - Hackaday | 2025.04.07 |
4 | Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing - The Hacker News | 2025.04.01 |
5 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Microsoft Security Blog | 2025.04.01 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing - The Hacker News | 2025.04.01 |
2 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Microsoft Security... | 2025.04.01 |
3 | Cases of China-Backed Spy Groups Using Ransomware Come to Light - Malware.News | 2025.02.22 |
4 | Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts - The Hacker News | 2025.02.14 |
5 | Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts - The Hacker News | 2025.02.14 |
View only the last 5 |