Summary: 2025/04/17 10:43

First reported date: 2010/05/28
Inquiry period : 2025/04/10 10:43 ~ 2025/04/17 10:43 (7 days), 42 search results

전 기간대비 40% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
CVE Vulnerability CISA Update Malware 입니다.
공격기술 hacking XSS 도 새롭게 확인됩니다.
기관 및 기업 Europe 도 새롭게 확인됩니다.
기타 program MITRE MWNEWS FortiGate access 등 신규 키워드도 확인됩니다.

The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.

CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Save our CVE! Last minute rescue for critical cybersecurity service
    ㆍ 2025/04/17 What's happening with MITRE and the CVE program uncertainty
    ㆍ 2025/04/17 CISA funds CVE program in the 11th hour of contract with MITRE

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1CVE 42 ▲ 17 (40%)
2Vulnerability 41 ▲ 16 (39%)
3CISA 12 ▲ 11 (92%)
4Update 12 ▲ 4 (33%)
5Malware 12 ▲ 5 (42%)
6Exploit 10 ▼ -2 (-20%)
7program 9 ▲ new
8MITRE 8 ▲ new
9RCE 7 ▲ 6 (86%)
10Government 6 ▲ 5 (83%)
11critical 6 ▲ 3 (50%)
12Report 6 ▲ 2 (33%)
13MWNEWS 5 ▲ new
14Fortinet 5 ▲ 4 (80%)
15FortiGate 5 ▲ new
16Software 5 ▲ 4 (80%)
17CVSS 5 ▼ -1 (-20%)
18Alert 4 - 0 (0%)
19Operation 4 ▲ 3 (75%)
20access 4 ▲ new
21intelligence 3 ▲ 2 (67%)
22funding 3 ▲ new
23Apache 3 ▲ new
24contract 3 ▲ new
25vulnerable 2 ▲ new
26NortonLifeLock 2 - 0 (0%)
27Vite 2 ▲ new
28file 2 ▲ new
29SSRF 2 ▲ new
30wild 2 ▲ 1 (50%)
31Gladinet 2 ▲ new
32target 2 ▲ 1 (50%)
33Java 2 - 0 (0%)
34Register 2 ▲ new
35securityaffairs 2 ▲ new
36href 2 ▲ new
37hacking 2 ▲ new
38Tomcat 2 ▲ new
39attack 2 - 0 (0%)
40CrushFTP 2 - 0 (0%)
41ThreatProtection 2 ▼ -1 (-50%)
42flaw 2 ▼ -1 (-50%)
43pillar 1 ▲ new
44support 1 ▲ new
45video 1 ▲ new
46shutdown 1 ▲ new
47HuntressLabs 1 ▲ new
48old 1 ▲ new
49Email 1 ▲ new
50Ready 1 ▲ new
51unlisted 1 ▲ new
52Symfonia 1 ▲ new
53Ends 1 ▲ new
54Cash 1 ▲ new
55Crisis 1 ▲ new
56Campaign 1 ▼ -1 (-100%)
57service 1 ▲ new
58Uncle 1 ▲ new
59YouTube 1 ▲ new
60Supply chain 1 - 0 (0%)
61ltpgt 1 ▲ new
62GitHub 1 ▼ -1 (-100%)
63Govt 1 ▲ new
64lastminute 1 ▲ new
65httpswww 1 ▲ new
66Takedown 1 ▲ new
67LinkedIn 1 - 0 (0%)
68Windows 1 ▼ -4 (-400%)
69Microsoft 1 ▼ -2 (-200%)
70Education 1 ▲ new
71Sam 1 ▲ new
72ChatGPT 1 ▲ new
73persistence 1 ▲ new
74Weve 1 ▲ new
75cve202427564 1 ▲ new
76PoC 1 - 0 (0%)
77denial 1 ▲ new
78Eclipse 1 ▲ new
79Europe 1 ▲ new
80Cisco 1 - 0 (0%)
81DDoS 1 - 0 (0%)
82course 1 ▲ new
83Cross 1 ▲ new
84amp 1 - 0 (0%)
85XSS 1 ▲ new
86Container 1 ▲ new
87deserialization 1 ▲ new
88Request 1 ▲ new
89HTTP 1 ▲ new
90Exec 1 ▲ new
91Python 1 ▲ new
92Abusing 1 ▲ new
93wont 1 ▲ new
94Docker 1 ▲ new
95fix 1 ▲ new
96NVIDIAs 1 ▲ new
97Toolkit 1 ▲ new
98symbolic 1 ▲ new
99NVIDIA 1 ▲ new
100apachetomcat 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
10 (43.5%)
RCE
7 (30.4%)
hacking
2 (8.7%)
Campaign
1 (4.3%)
DDoS
1 (4.3%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
CISA
12 (40%)
Government
6 (20%)
Fortinet
5 (16.7%)
Microsoft
1 (3.3%)
Europe
1 (3.3%)
Threat info
Last 5

Additional information

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info One or more processes crashed
Network ET INFO TLS Handshake Failure
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.