Summary: 2025/04/17 13:02

First reported date: 2014/05/13
Inquiry period : 2025/04/10 13:02 ~ 2025/04/17 13:02 (7 days), 5 search results

전 기간대비 60% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
HTTP 입니다.
기타 Navigator VT AV FUD emacsbin 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/15 [webapps] IBMi Navigator 7.5 - HTTP Security Token Bypass

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1HTTP 5 ▲ 3 (60%)
2Navigator 1 ▲ new
3VT 1 ▲ new
4AV 1 ▲ new
5FUD 1 ▲ new
6emacsbin 1 ▲ new
7stage 1 ▼ -1 (-100%)
8Next 1 ▼ -1 (-100%)
9crond 1 ▲ new
10Token 1 ▲ new
11IBMi 1 ▲ new
12Status 1 ▲ new
13QRadar Security Suite 1 ▲ new
14target 1 ▲ new
15Vulnerability 1 ▲ new
16Request 1 ▲ new
17Vite 1 ▲ new
18CVE 1 ▲ new
19Alert 1 ▲ new
20Codes 1 ▲ new
21thorscanner 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


No data.

Country & Company
Country & Company

This is a country or company that is an issue.


No data.

Additional information

No Title Date
1HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
2HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
3HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
4HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
5HTTP/3 is everywhere but nowhere - Malware.News2025.03.13
View only the last 5
Level Description
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Potentially malicious URLs were found in the process memory dump
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
Network SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
No data
No data
Beta Service, If you select keyword, you can check detailed information.