Summary: 2025/04/19 12:31
First reported date: 2015/03/12
Inquiry period : 2025/03/20 12:31 ~ 2025/04/19 12:31 (1 months), 13 search results
전 기간대비 8% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Process Malware Advertising attack target 입니다.
악성코드 유형 Entropy GameoverP2P 도 새롭게 확인됩니다.
공격기술 hijack Campaign Hijacking RCE 도 새롭게 확인됩니다.
기관 및 기업 Kaspersky Cisco Check Point Saudi Arabia Europe Government 도 새롭게 확인됩니다.
기타 intelligence exe Mall GitHub Pall 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/16 What is Incident Response? Process, Plan, and Complete Guide (2025)
ㆍ 2025/04/11 From Exploit to Ransomware: Detecting CVE-2025-29824
ㆍ 2025/04/08 Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Process | 13 | ▲ 1 (8%) |
2 | Malware | 7 | ▲ 1 (14%) |
3 | Advertising | 4 | ▲ 3 (75%) |
4 | Update | 3 | - 0 (0%) |
5 | intelligence | 3 | ▲ new |
6 | exe | 3 | ▲ new |
7 | attack | 3 | ▲ 2 (67%) |
8 | target | 3 | ▲ 2 (67%) |
9 | Remote Code Execution | 3 | - 0 (0%) |
10 | Microsoft | 3 | ▲ 2 (67%) |
11 | Windows | 3 | ▲ 1 (33%) |
12 | United States | 2 | - 0 (0%) |
13 | Software | 2 | ▲ 1 (50%) |
14 | hijack | 2 | ▲ new |
15 | Mall | 2 | ▲ new |
16 | GitHub | 2 | ▲ new |
17 | Pall | 2 | ▲ new |
18 | Exploit | 2 | - 0 (0%) |
19 | powershell | 2 | ▲ new |
20 | Report | 2 | - 0 (0%) |
21 | Knowing | 1 | ▲ new |
22 | IoC | 1 | ▲ new |
23 | Campaign | 1 | ▲ new |
24 | Management | 1 | ▲ new |
25 | Kaspersky | 1 | ▲ new |
26 | Dark | 1 | ▲ new |
27 | Vulnerability | 1 | ▲ new |
28 | Reading | 1 | ▲ new |
29 | Ransomware | 1 | ▼ -1 (-100%) |
30 | Your | 1 | ▲ new |
31 | Voluntary | 1 | ▲ new |
32 | spyware | 1 | ▲ new |
33 | c&c | 1 | ▲ new |
34 | command | 1 | ▲ new |
35 | Cisco | 1 | ▲ new |
36 | Research | 1 | ▲ new |
37 | Plan | 1 | ▲ new |
38 | Response | 1 | ▲ new |
39 | Incident | 1 | ▲ new |
40 | EDR | 1 | ▲ new |
41 | Check Point | 1 | ▲ new |
42 | Hijacking | 1 | ▲ new |
43 | Thread | 1 | ▲ new |
44 | Point | 1 | ▲ new |
45 | ZeroDay | 1 | ▲ new |
46 | Check | 1 | ▲ new |
47 | OR | 1 | ▲ new |
48 | file | 1 | ▲ new |
49 | Early | 1 | ▲ new |
50 | RCE | 1 | ▲ new |
51 | PoC | 1 | ▲ new |
52 | SaudiArabia | 1 | ▲ new |
53 | Saudi Arabia | 1 | ▲ new |
54 | Linux | 1 | - 0 (0%) |
55 | 1 | - 0 (0%) | |
56 | Photographic | 1 | ▲ new |
57 | Opera | 1 | ▲ new |
58 | Europe | 1 | ▲ new |
59 | Government | 1 | ▲ new |
60 | UCPD | 1 | ▲ new |
61 | default | 1 | ▲ new |
62 | Operation | 1 | ▼ -1 (-100%) |
63 | Browser | 1 | ▲ new |
64 | Firefox | 1 | ▲ new |
65 | UKs | 1 | ▲ new |
66 | Vawtrak | 1 | ▼ -1 (-100%) |
67 | Entropy | 1 | ▲ new |
68 | GameoverP2P | 1 | ▲ new |
69 | ChatGPT | 1 | ▲ new |
70 | Steps | 1 | ▲ new |
71 | CoFounder | 1 | ▲ new |
72 | Chapter | 1 | ▲ new |
73 | Fix | 1 | ▲ new |
74 | Broken | 1 | ▲ new |
75 | Forgotten | 1 | ▲ new |
76 | WMI | 1 | ▲ new |
77 | film | 1 | ▲ new |
78 | host | 1 | ▲ new |
79 | Red Team | 1 | ▲ new |
80 | Password | 1 | ▲ new |
81 | DNS | 1 | ▲ new |
82 | Starts | 1 | ▲ new |
83 | schtasks | 1 | ▲ new |
84 | IoT | 1 | ▲ new |
85 | Defense | 1 | ▲ new |
86 | discovery | 1 | ▲ new |
87 | Copilot | 1 | ▲ new |
88 | Tokens | 1 | ▲ new |
89 | Engineering | 1 | - 0 (0%) |
90 | Reverse | 1 | - 0 (0%) |
91 | MWNEWS | 1 | ▲ new |
92 | YouTube | 1 | ▲ new |
93 | Complete | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
1 (25%) |
Vawtrak |
|
1 (25%) |
Entropy |
|
1 (25%) |
GameoverP2P |
|
1 (25%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Remote Code Execution |
|
3 (30%) |
hijack |
|
2 (20%) |
Exploit |
|
2 (20%) |
Campaign |
|
1 (10%) |
Hijacking |
|
1 (10%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
3 (27.3%) |
United States |
|
2 (18.2%) |
Kaspersky |
|
1 (9.1%) |
Cisco |
|
1 (9.1%) |
Check Point |
|
1 (9.1%) |
Threat info
Last 5SNS
(Total : 3)Advertising Microsoft hijack Check Point Hijacking Malware Remote Code Execution IoT intelligence EDR
News
(Total : 10)Malware Windows attack target Update United States Advertising Exploit intelligence Software Remote Code Execution GitHub Attacker Report Microsoft powershell Kaspersky Vulnerability spyware Vawtrak IoC Linux Campaign Ransomware c&c Cisco ZeroDay Saudi Arabia PoC RCE Password Firefox Opera Browser hijack GameoverP2P Operation ChatGPT Government Europe Red Team YouTube WMI schtasks LinkedIn DNS Entropy
No | Title | Date |
---|---|---|
1 | What is Incident Response? Process, Plan, and Complete Guide (2025) - Malware.News | 2025.04.16 |
2 | From Exploit to Ransomware: Detecting CVE-2025-29824 - Malware.News | 2025.04.11 |
3 | Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses - CyberScoop | 2025.04.08 |
4 | Process Management: Knowing What is Running on Your System – Part 4 of 5 of the Terminal Techniques for You (TTY): Making Linux Security Accessible Blog Series - SANS Blog | 2025.04.07 |
5 | A Forgotten Photographic Process Characterised - Hackaday | 2025.04.02 |
Additional information
No | Title | Date |
---|---|---|
1 | Tesla to Delay Production of Cheaper EVs, Reuters Reports - Bloomberg Technology | 2025.04.19 |
2 | When Vulnerability Information Flows are Vulnerable Themselves - Malware.News | 2025.04.19 |
3 | CISA warns threat hunting staff of end to Google, Censys contracts as agency cuts set in - Malware.News | 2025.04.19 |
4 | Radiology practice reportedly working with FBI after ‘data security incident’ - Malware.News | 2025.04.19 |
5 | Text scams grow to steal hundreds of millions of dollars - Malware.News | 2025.04.19 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | From Exploit to Ransomware: Detecting CVE-2025-29824 - Malware.News | 2025.04.11 |
2 | From Exploit to Ransomware: Detecting CVE-2025-29824 - Malware.News | 2025.04.11 |
3 | From Exploit to Ransomware: Detecting CVE-2025-29824 - Malware.News | 2025.04.11 |
4 | Inside Windows’s Default Browser Protection - Malware.News | 2025.03.26 |
5 | Threat Hunting step-by-step: Collecting Web Shells using Ephemeral Baselines - Malware.News | 2025.02.25 |
View only the last 5 |