Summary: 2025/05/04 11:59
First reported date: 2016/12/01
Inquiry period : 2025/04/04 11:59 ~ 2025/05/04 11:59 (1 months), 6 search results
전 기간대비 67% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Gen AI 입니다.
악성코드 유형 GameoverP2P 도 새롭게 확인됩니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 CrowdStrike Trend Micro United States 도 새롭게 확인됩니다.
기타 LLM team OWASP Top KI 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/27 Gen Z und KI: Warum 44 Prozent glauben, dass die Roboter bald regieren
ㆍ 2025/04/15 Top 10 for LLM & Gen AI Project Ranked by OWASP
ㆍ 2025/04/10 Technical Program Value Chain Transformation using GenAI E2E Automated solution
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Gen | 6 | ▲ 4 (67%) |
2 | AI | 3 | ▲ 2 (67%) |
3 | CrowdStrike | 2 | ▲ new |
4 | NSA | 1 | - 0 (0%) |
5 | LLM | 1 | ▲ new |
6 | team | 1 | ▲ new |
7 | Trend Micro | 1 | ▲ new |
8 | OWASP | 1 | ▲ new |
9 | Top | 1 | ▲ new |
10 | KI | 1 | ▲ new |
11 | ChatGPT | 1 | ▲ new |
12 | AIpowered | 1 | ▲ new |
13 | dass | 1 | ▲ new |
14 | Prozent | 1 | ▲ new |
15 | glauben | 1 | ▲ new |
16 | Winning | 1 | ▲ new |
17 | Combination | 1 | ▲ new |
18 | critical | 1 | ▲ new |
19 | threat | 1 | ▲ new |
20 | Technical | 1 | ▲ new |
21 | Imagine | 1 | ▲ new |
22 | GameoverP2P | 1 | ▲ new |
23 | Haugh | 1 | ▲ new |
24 | Timothy | 1 | ▲ new |
25 | leadership | 1 | ▲ new |
26 | Malware | 1 | - 0 (0%) |
27 | Report | 1 | - 0 (0%) |
28 | United States | 1 | ▲ new |
29 | Update | 1 | ▲ new |
30 | Trump | 1 | ▲ new |
31 | Advertising | 1 | ▲ new |
32 | Takedown | 1 | ▲ new |
33 | 1 | - 0 (0%) | |
34 | RCE | 1 | ▲ new |
35 | Operation | 1 | ▲ new |
36 | GenAI | 1 | ▲ new |
37 | Program | 1 | ▲ new |
38 | attack | 1 | - 0 (0%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
GameoverP2P |
|
1 (100%) |

Attacker & Actors
The status of the attacker or attack group being issued.
No data.


Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
CrowdStrike |
|
2 (40%) |
NSA |
|
1 (20%) |
Trend Micro |
|
1 (20%) |
United States |
|
1 (20%) |
Threat info
Last 5SNS
(Total : 2)News
(Total : 4)NSA ChatGPT Trend Micro RCE Operation Email Takedown Advertising Update GameoverP2P United States Report Malware
No | Title | Date |
---|---|---|
1 | Gen Z und KI: Warum 44 Prozent glauben, dass die Roboter bald regieren - IT Sicherheitsnews | 2025.04.27 |
2 | Top 10 for LLM & Gen AI Project Ranked by OWASP - TrendMicro | 2025.04.15 |
3 | Technical Program Value Chain Transformation using GenAI E2E Automated solution - Malware.News | 2025.04.10 |
4 | Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA - CyberScoop | 2025.04.04 |
Additional information
No | Title | Date |
---|---|---|
1 | 틱톡, 유럽 사용자 데이터 중국 전송.. 8000억대 벌금 - 시큐리티팩트 | 2025.05.03 |
2 | Saskatoon children’s hospital nurse unlawfully snooped on records of 314 patients: privacy report - Malware.News | 2025.05.03 |
3 | Dating app Raw exposed users’ location data and personal information - Malware.News | 2025.05.03 |
4 | Hacker hired Telangana man to courier threats to Star Health Insurance MD - Malware.News | 2025.05.03 |
5 | Acadian Ambulance Seeks Dismissal of Data Breach Lawsuit - Malware.News | 2025.05.03 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Top 10 for LLM & Gen AI Project Ranked by OWASP - TrendMicro | 2025.04.15 |
2 | Trump fires Gen. Timothy Haugh from leadership of Cyber Command and NSA - CyberScoop | 2025.04.04 |
3 | Out with the Old, In with the Bold: Gen Threat Labs - Malware.News | 2025.02.14 |
4 | Out with the Old, In with the Bold: Gen Threat Labs - Malware.News | 2025.02.14 |
5 | Gen Q3/2024 Threat Report - Malware.News | 2024.11.19 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() Gen | 9d1b497b9d05f015cc768ee06fe6050d | 10045 | 2021.04.01 |
2 | ![]() Gen | 5daa2140732ce865b202962807d107b1 | 10046 | 2021.04.01 |
3 | asse9e3x.rar Gen | 3d0fffa0fe157c3bffb917e6a8d9da2e | 10062 | 2021.04.01 |
4 | ![]() Gen | c50eeb216ab9f7e9b375270426c4dfd6 | 9945 | 2021.03.30 |
5 | ![]() Emotet Gen | f3da2faeed91df74170149fc4420ef09 | 9802 | 2021.03.27 |
View only the last 5 |
Level | Description |
---|---|
danger | File has been identified by 38 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Drops 100 unknown file mime types indicative of ransomware writing encrypted files back to disk |
watch | One or more non-whitelisted processes were created |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Resolves a suspicious Top Level Domain (TLD) |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |