Summary: 2025/04/17 13:11

First reported date: 2008/11/30
Inquiry period : 2025/04/10 13:11 ~ 2025/04/17 13:11 (7 days), 66 search results

전 기간대비 -5% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Malware Report attack target Exploit 입니다.
공격기술 RCE hijack 도 새롭게 확인됩니다.
기관 및 기업 Fortinet Cisco Russia CrowdStrike Türkiye 도 새롭게 확인됩니다.
기타 Android Dark ZeroDay Snapshot GitHub 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/17 Exploiting SMS: Threat Actors Use Social Engineering to Target Companies
    ㆍ 2025/04/16 Threat Intelligence Snapshot: Week 16, 2025
    ㆍ 2025/04/16 Threat Intelligence Snapshot: Week 15, 2025

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1threat 66 ▼ -3 (-5%)
2Malware 24 ▲ 3 (13%)
3Report 18 ▲ 8 (44%)
4attack 17 ▲ 6 (35%)
5target 13 ▲ 2 (15%)
6intelligence 13 - 0 (0%)
7Exploit 12 ▲ 1 (8%)
8actor 12 ▼ -8 (-67%)
9Update 10 ▲ 5 (50%)
10Ransomware 8 ▲ 4 (50%)
11Campaign 8 ▼ -5 (-63%)
12Email 8 ▲ 3 (38%)
13Android 7 ▲ new
14China 7 ▲ 2 (29%)
15Phishing 6 ▼ -3 (-50%)
16United States 6 - 0 (0%)
17RCE 6 ▲ new
18Google 6 ▲ 2 (33%)
19Microsoft 6 ▲ 2 (33%)
20Vulnerability 6 - 0 (0%)
21Alert 5 ▲ 4 (80%)
22Criminal 5 ▼ -3 (-60%)
23Operation 5 ▼ -2 (-40%)
24Fortinet 5 ▲ new
25Dark 4 ▲ new
26ZeroDay 4 ▲ new
27Password 4 ▲ 3 (75%)
28Education 3 - 0 (0%)
29Snapshot 3 ▲ new
30GitHub 3 ▲ new
31Browser 3 ▲ 1 (33%)
32DarkWeb 3 ▼ -1 (-33%)
33Reading 3 ▲ new
34Data 3 - 0 (0%)
35April 3 ▼ -5 (-167%)
36Research 3 ▲ new
37Smishing 3 ▲ 2 (67%)
38MWNEWS 3 ▲ new
39domain 3 ▲ new
40Government 3 ▲ 2 (67%)
41Europe 3 ▲ 1 (33%)
42Sale 3 ▲ 1 (33%)
43Advertising 3 - 0 (0%)
44Team 3 ▲ new
45Victim 3 ▼ -1 (-33%)
46Breach 3 ▲ 2 (67%)
47googlecloudnext 2 ▲ new
48hijack 2 ▲ new
49Cisco 2 ▲ new
50GLOBAL 2 ▲ new
51Social Engineering 2 - 0 (0%)
52detection 2 ▲ new
53Leak 2 ▲ new
54Software 2 ▼ -1 (-50%)
55Cryptocurrency 2 ▲ 1 (50%)
56IoC 2 ▲ 1 (50%)
57Blog 2 ▲ 1 (50%)
58sherrodim 2 ▲ new
59Annual 2 ▲ new
60Daily 2 ▼ -3 (-150%)
61Sophos 2 ▲ new
62Russia 2 ▲ new
63Kaspersky 2 ▲ 1 (50%)
64controller 2 ▲ new
65CrowdStrike 2 ▲ new
66MFA 2 ▲ new
67SpyNote 2 ▲ new
68VPN 2 - 0 (0%)
69Windows 2 ▼ -1 (-50%)
70Group 2 - 0 (0%)
71Intel 2 ▲ 1 (50%)
72access 2 ▼ -1 (-50%)
73Consumer 2 ▲ new
74Paper 2 ▲ new
75Werewolf 2 ▲ new
76Alleged 2 - 0 (0%)
77ChinaBacked 1 ▲ new
78ESET 1 - 0 (0%)
79Spotify 1 ▲ new
80Docker 1 ▲ new
81Linux 1 ▲ new
82Proofpoint 1 ▼ -1 (-100%)
83Schools 1 ▲ new
84Firm 1 - 0 (0%)
85land 1 ▲ new
86INTERPOLs 1 ▼ -1 (-100%)
87AIbased 1 ▲ new
88African 1 ▼ -1 (-100%)
89variety 1 ▲ new
90humancentricsecurity 1 ▲ new
91Gen 1 ▲ new
92Türkiye 1 ▲ new
93Check 1 - 0 (0%)
94Point 1 - 0 (0%)
95Check Point 1 - 0 (0%)
96AIpowered 1 ▲ new
97Top 1 ▲ new
98arrest 1 ▼ -1 (-100%)
99Imagine 1 ▲ new
100Africa 1 ▼ -1 (-100%)
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
Ransomware
8 (72.7%)
Clipbanker
1 (9.1%)
Grandoreiro
1 (9.1%)
Trojan
1 (9.1%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
UNC5221
1 (33.3%)
Tick
1 (33.3%)
sectora01
1 (33.3%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
12 (28.6%)
Campaign
8 (19%)
Phishing
6 (14.3%)
RCE
6 (14.3%)
Smishing
3 (7.1%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
China
7 (13%)
United States
6 (11.1%)
Google
6 (11.1%)
Microsoft
6 (11.1%)
Fortinet
5 (9.3%)
Threat info
Last 5

SNS

(Total : 45)
  Total keyword

Report attack Intelligence Malware Exploit Ransomware target Operation Email China Microsoft Update Fortinet Google Android Kaspersky DarkWeb Russia RCE Password Vulnerability Campaign CrowdStrike Takedown Social Engineering ZeroDay Türkiye Check Point arrest Criminal Africa North Korea Virus Education conference Cryptocurrency Proofpoint dprk sectora01 WordPress ...

No Title Date
1Cyber_OSINT @Cyber_O51NT
The Sysdig Threat Research Team reported that UNC5174 has evolved its cyber warfare tactics in China, transitioning from SNOWLIGHT to the sophisticated VShell tool for espionage and access brokering. #CyberSecurity #UNC5174 https://t.co/BUUv0rugdi
2025.04.16
2ANY.RUN @anyrun_app
???? Effective threat detection depends on Indicators of Compromise, Attack & Behavior. But do you know the difference between them? Find out and see how you can use them to enrich alerts, gain threat context, and perform malware hunting ???? https://t.co/9QddtlZwEz
2025.04.16
3lazarusholic @lazarusholic
"Monthly Threat Actor Group Intelligence Report, February 2025 (ENG)" published by @nshcthreatrecon. #SectorA, #SectorA01, #SectorA02, #SectorA05 SectorA07, #Trend, #DPRK, #CTI https://t.co/R6KkS6Emjb
2025.04.16
4Virus Bulletin @virusbtn
The Cyber Threat Alliance is once again partnering the Virus Bulletin conference Threat Intelligence Practitioners Summit (TIPS) and is seeking proposals for presentations. The theme for the VB2025 TIPS track is Community Driven Threat Defense. Details at: https://t.co/m3AgmGgsEW https://t.co/aPUW2D
2025.04.16
5Microsoft Threat Intelligence @MsftSecIntel
@sherrod_im In the case of the Russian threat actor Star Blizzard, while their campaigns have always been focused on email credential theft, the actor has persistently introduced new techniques to avoid detection, and either modified or abandoned them once they become publicly known.
2025.04.16

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.