Summary: 2025/04/17 13:19
First reported date: 2010/08/25
Inquiry period : 2025/03/18 13:19 ~ 2025/04/17 13:19 (1 months), 614 search results
전 기간대비 3% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 attack Malware Report target Exploit 입니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/17 Hi, robot: Half of all internet traffic now automated
ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
ㆍ 2025/04/17 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | attack | 614 | ▲ 19 (3%) |
2 | Malware | 339 | ▲ 42 (12%) |
3 | Report | 208 | ▲ 48 (23%) |
4 | target | 196 | ▲ 30 (15%) |
5 | Exploit | 160 | ▲ 16 (10%) |
6 | Update | 142 | ▲ 40 (28%) |
7 | Ransomware | 117 | ▲ 5 (4%) |
8 | Operation | 113 | ▲ 26 (23%) |
9 | Campaign | 104 | ▼ -13 (-13%) |
10 | Phishing | 104 | ▲ 10 (10%) |
11 | intelligence | 99 | ▼ -3 (-3%) |
12 | United States | 98 | ▲ 14 (14%) |
13 | Remote Code Execution | 93 | ▼ -19 (-20%) |
14 | Vulnerability | 84 | ▲ 1 (1%) |
15 | Software | 81 | ▲ 12 (15%) |
16 | Advertising | 78 | ▲ 24 (31%) |
17 | 72 | ▼ -5 (-7%) | |
18 | Criminal | 67 | ▼ -14 (-21%) |
19 | Victim | 67 | ▲ 3 (4%) |
20 | Windows | 67 | ▲ 23 (34%) |
21 | MWNEWS | 66 | ▲ 21 (32%) |
22 | Kaspersky | 63 | ▲ 15 (24%) |
23 | Government | 59 | ▲ 6 (10%) |
24 | Microsoft | 55 | ▼ -5 (-9%) |
25 | threat | 55 | ▲ 10 (18%) |
26 | Supply chain | 52 | ▲ 19 (37%) |
27 | ZeroDay | 48 | ▲ 22 (46%) |
28 | China | 45 | ▲ 1 (2%) |
29 | 40 | ▲ 8 (20%) | |
30 | GitHub | 39 | ▲ 13 (33%) |
31 | Russia | 39 | ▲ 8 (21%) |
32 | Education | 38 | ▼ -17 (-45%) |
33 | Password | 38 | ▼ -2 (-5%) |
34 | RCE | 35 | ▲ 33 (94%) |
35 | IoC | 35 | ▲ 4 (11%) |
36 | Browser | 34 | ▲ 10 (29%) |
37 | Backdoor | 30 | ▲ 1 (3%) |
38 | hacking | 26 | ▼ -10 (-38%) |
39 | Trojan | 26 | ▲ 7 (27%) |
40 | Android | 26 | ▲ 12 (46%) |
41 | Linux | 26 | ▲ 9 (35%) |
42 | AI | 25 | ▼ -1 (-4%) |
43 | c&c | 25 | ▲ 6 (24%) |
44 | malicious | 25 | ▲ 10 (40%) |
45 | DDoS | 24 | ▼ -18 (-75%) |
46 | Stealer | 23 | ▼ -17 (-74%) |
47 | Cryptocurrency | 23 | ▲ 2 (9%) |
48 | GameoverP2P | 22 | ▲ 7 (32%) |
49 | Chrome | 22 | ▲ 17 (77%) |
50 | 21 | ▲ 8 (38%) | |
51 | Europe | 19 | ▲ 3 (16%) |
52 | Ucraina | 19 | ▲ 6 (32%) |
53 | hijack | 18 | ▲ 11 (61%) |
54 | MFA | 18 | ▼ -9 (-50%) |
55 | 17 | ▲ 1 (6%) | |
56 | powershell | 17 | - 0 (0%) |
57 | Distribution | 17 | ▼ -6 (-35%) |
58 | EDR | 17 | ▲ 12 (71%) |
59 | April | 17 | ▲ 16 (94%) |
60 | CVSS | 17 | ▲ 8 (47%) |
61 | DarkWeb | 17 | ▼ -7 (-41%) |
62 | CISA | 16 | - 0 (0%) |
63 | supply | 15 | ▲ 8 (53%) |
64 | ESET | 14 | ▲ 9 (64%) |
65 | US | 14 | ▲ 1 (7%) |
66 | Social Engineering | 14 | ▼ -7 (-50%) |
67 | DNS | 14 | ▲ 8 (57%) |
68 | Java | 14 | ▼ -3 (-21%) |
69 | Takedown | 14 | ▼ -6 (-43%) |
70 | March | 14 | ▲ 1 (7%) |
71 | CVE | 14 | ▼ -5 (-36%) |
72 | breach | 14 | ▲ 13 (93%) |
73 | RATel | 13 | ▼ -3 (-23%) |
74 | Recorded Future | 13 | ▲ 1 (8%) |
75 | Vawtrak | 13 | ▲ 5 (38%) |
76 | Banking | 13 | - 0 (0%) |
77 | chain | 13 | - 0 (0%) |
78 | Code | 13 | ▲ 1 (8%) |
79 | access | 13 | - 0 (0%) |
80 | Daily | 12 | ▲ 4 (33%) |
81 | Cisco | 12 | ▼ -4 (-33%) |
82 | Dark | 12 | ▼ -1 (-8%) |
83 | Zero Trust | 12 | ▲ 5 (42%) |
84 | NetWireRC | 12 | ▼ -11 (-92%) |
85 | critical | 12 | ▲ 6 (50%) |
86 | payment | 12 | ▼ -13 (-108%) |
87 | group | 11 | ▼ -7 (-64%) |
88 | Palo Alto Networks | 11 | ▼ -2 (-18%) |
89 | Attacks | 11 | ▼ -8 (-73%) |
90 | VPN | 11 | ▲ 1 (9%) |
91 | North Korea | 10 | ▼ -14 (-140%) |
92 | DYEPACK | 10 | ▼ -3 (-30%) |
93 | United Kingdom | 10 | ▲ 4 (40%) |
94 | ChatGPT | 10 | ▲ 1 (10%) |
95 | NSA | 10 | ▲ 4 (40%) |
96 | Detection | 10 | ▲ 5 (50%) |
97 | Alert | 9 | ▲ 6 (67%) |
98 | How | 9 | ▼ -1 (-11%) |
99 | FBI | 9 | ▼ -2 (-22%) |
100 | Red Team | 9 | ▲ 1 (11%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
117 (54.9%) |
Trojan |
|
26 (12.2%) |
GameoverP2P |
|
22 (10.3%) |
RATel |
|
13 (6.1%) |
Vawtrak |
|
13 (6.1%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
160 (25.2%) |
Campaign |
|
104 (16.4%) |
Phishing |
|
104 (16.4%) |
Remote Code Execution |
|
93 (14.6%) |
RCE |
|
35 (5.5%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
98 (16.4%) |
Kaspersky |
|
63 (10.5%) |
Government |
|
59 (9.8%) |
Microsoft |
|
55 (9.2%) |
China |
|
45 (7.5%) |
Threat info
Last 5SNS
(Total : 212)attack Ransomware Update target Exploit Phishing Kaspersky Report Malware ZeroDay Operation Email Supply chain United States Victim Chrome Vulnerability Education Criminal Campaign China EDR Windows Attacker Google Government Backdoor DDoS US Russia Targeted Ucraina RCE hacking Browser Attacks Recorded Future Intelligence Java Android GitHub IoC United Kingdom Password Cryptocurrency ClickFix ukraine Software Palo Alto Networks ...
News
(Total : 402)attack Malware Report target Exploit Update Operation Attacker Campaign intelligence Remote Code Execution United States Software Advertising Vulnerability Ransomware Phishing Email Windows Victim Criminal Government Microsoft Supply chain Kaspersky China Password GitHub IoC Google Russia ZeroDay Browser RCE Education c&c Trojan Linux Backdoor Android Stealer hacking GameoverP2P Cryptocurrency LinkedIn Twitter Europe Distribution DDoS powershell hijack MFA DarkWeb CVSS DNS ESET CISA Vawtrak Takedown RATel Chrome Social Engineering Ucraina Banking payment CVE NetWireRC Cisco DYEPACK VPN Zero Trust NSA Java Recorded Future South Korea EDR ChatGPT YouTube Kubernetes Germany Palo Alto Networks Red Team FBI NIST US Chinese Amazon ...
No | Title | Date |
---|---|---|
1 | Cascading Shadows: An Attack Chain Approach to Avoid Detection and Complicate Analysis - Unit 42 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
4 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
5 | Understanding Telemetry in Cybersecurity - Malware.News | 2025.04.16 |
Additional information
No | Title | Date |
---|---|---|
1 | 엔디비아 'AI 심장부' GPU에 보안 구멍.. '즉시 패치' 비상 - 시큐리티팩트 | 2025.04.17 |
2 | Hi, robot: Half of all internet traffic now automated - Malware.News | 2025.04.17 |
3 | Zoom Sees Outage With 50,000 Users Reporting Availability Issues - Bloomberg Technology | 2025.04.17 |
4 | Nude photos and names: KU Health and Kansas hospital sued for data breach - Malware.News | 2025.04.17 |
5 | DeepSeek Poses ‘Profound’ Security Threat, US House Panel Claims - Bloomberg Technology | 2025.04.17 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Exploiting SMS: Threat Actors Use Social Engineering to Target Companies - Malware.News | 2025.04.17 |
2 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
3 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
4 | Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 - Malware.News | 2025.04.17 |
5 | BreachForums purportedly disrupted by pro-Palestinian hackers - Malware.News | 2025.04.16 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://95.214.55.202:3306/TomcatBypass/Command/Base64/a2lsbGFsbCAtOSBwYXJhaXNvLng4Njsga2lsbGFsbCAtOS... attack shell TomcatByPass | PL ![]() | Meverywhere sp. z o.o. | abus3reports | 2024.05.14 |
2 | http://194.59.31.163:2411/TomcatBypass/Command/Base64/d2dldCAtTy0gaHR0cDovLzE5NC41OS4zMS4xNjMvbGkyLn... attack shell TomcatByPass | US ![]() | abus3reports | 2024.05.14 |