Summary: 2025/05/01 00:43
First reported date: 2016/06/29
Inquiry period : 2025/04/01 00:42 ~ 2025/05/01 00:42 (1 months), 5 search results
전 기간대비 60% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 IAM 입니다.
공격기술 Exploit 도 새롭게 확인됩니다.
기관 및 기업 Microsoft 도 새롭게 확인됩니다.
기타 identity Advertising access Report microsoftentra 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/01 IAM token exploits drive cloud attack spike in 2024
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | IAM | 5 | ▲ 3 (60%) |
2 | identity | 2 | ▲ new |
3 | Advertising | 2 | ▲ new |
4 | Microsoft | 2 | ▲ new |
5 | access | 2 | ▲ new |
6 | Report | 2 | ▲ new |
7 | microsoftentra | 2 | ▲ new |
8 | Malware | 1 | ▲ new |
9 | hybridremote | 1 | ▲ new |
10 | percent | 1 | ▲ new |
11 | Entra | 1 | ▲ new |
12 | Check | 1 | ▲ new |
13 | app | 1 | ▲ new |
14 | network | 1 | ▲ new |
15 | management | 1 | ▲ new |
16 | deployment | 1 | ▲ new |
17 | collaboration | 1 | ▲ new |
18 | Anywhere | 1 | ▲ new |
19 | Roles | 1 | ▲ new |
20 | AWS | 1 | ▲ new |
21 | Amazon | 1 | - 0 (0%) |
22 | MWNEWS | 1 | ▲ new |
23 | spike | 1 | ▲ new |
24 | cloud | 1 | - 0 (0%) |
25 | attack | 1 | ▲ new |
26 | Exploit | 1 | ▲ new |
27 | work | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
1 (100%) |
Threat info
Last 5SNS
(Total : 3)
Total keyword
News
(Total : 2)
Total keyword
Malware Report Exploit attack Advertising Amazon
No | Title | Date |
---|---|---|
1 | Planning for your IAM Roles Anywhere deployment - AWS Security Blog | 2025.04.03 |
2 | IAM token exploits drive cloud attack spike in 2024 - Malware.News | 2025.04.01 |
Additional information
No | Title | Date |
---|---|---|
1 | Nvidia CEO on Tariffs, AI Chips, China Competition - Bloomberg Technology | 2025.04.30 |
2 | Google’s 2024 Zero-Day Report: Key Trends, Targets, and Exploits - Malware.News | 2025.04.30 |
3 | Fake Social Security Statement emails trick users into installing remote tool - Malware.News | 2025.04.30 |
4 | What Is QR Code Phishing? How to Protect Yourself from This QR Code Scam - Malware.News | 2025.04.30 |
5 | Exploring the State of AI in Cyber Security: Past, Present, and Future - Malware.News | 2025.04.30 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Planning for your IAM Roles Anywhere deployment - AWS Security Blog | 2025.04.03 |
2 | How to restrict Amazon S3 bucket access to a specific IAM role - AWS Security Blog | 2025.02.15 |
3 | CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center - Malware.News | 2024.12.04 |
4 | Important changes to CloudTrail events for AWS IAM Identity Center - AWS Security Blog | 2024.11.20 |
5 | Important changes to CloudTrail events for AWS IAM Identity Center - AWS Security Blog | 2024.11.20 |
View only the last 5 |
No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.