Summary: 2025/05/08 05:18
First reported date: 2020/12/14
Inquiry period : 2025/04/08 05:18 ~ 2025/05/08 05:18 (1 months), 1 search results
전 기간대비 동일한 트렌드를 보이고 있습니다.
공격기술 Exploit 도 새롭게 확인됩니다.
기관 및 기업 Microsoft 도 새롭게 확인됩니다.
기타 exploitation CVE ZeroDay Vulnerability Windows 신규 키워드도 확인됩니다.
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Microsoft | 1 | ▲ new |
2 | postcompromise | 1 | - 0 (0%) |
3 | exploitation | 1 | ▲ new |
4 | CVE | 1 | ▲ new |
5 | ZeroDay | 1 | ▲ new |
6 | Vulnerability | 1 | ▲ new |
7 | Windows | 1 | ▲ new |
8 | Exploit | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
1 (100%) |
Threat info
Last 5SNS
(Total : 1)
Total keyword
Microsoft CVE ZeroDay Vulnerability Windows Exploit
News
(Total : 0)No data.
Additional information
No | Title | Date |
---|---|---|
1 | CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS - Malware.News | 2025.05.08 |
2 | 10,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in Eventin WordPress Plugin - Malware.News | 2025.05.08 |
3 | Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 2 - Malware.News | 2025.05.08 |
4 | Google Cloud most vulnerable among major cloud platforms, report says - Malware.News | 2025.05.08 |
5 | Cyberattack puts healthcare on hold for hundreds in St. Louis metro - Malware.News | 2025.05.07 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials - Palada | 2024.04.24 |
2 | Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials - Microsoft Security | 2024.04.23 |
3 | The 3 most common post-compromise tactics on network infrastructure - Talos | 2024.03.08 |
4 | Proofpoint CEO on Thwarting Post-Compromise Lateral Movement - Proofpoint | 2023.02.03 |
5 | Microsoft Details New Post-Compromise Malware Used by Russian Cyberspies - Securityweek | 2022.08.25 |
View only the last 5 |
No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.