Summary: 2025/04/15 18:58
First reported date: 2008/01/07
Inquiry period : 2025/04/14 18:58 ~ 2025/04/15 18:58 (1 days), 16 search results
지난 7일 기간대비 -19% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 Malware attack RCE Report Operation 입니다.
악성코드 유형 Akira Alureon Emotet 도 새롭게 확인됩니다.
공격기술 Hijacking hooking 도 새롭게 확인됩니다.
기관 및 기업 세이프브리치 Mandiant 도 새롭게 확인됩니다.
기타 link return getshared ltlt execution 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/15 Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow
ㆍ 2025/04/15 Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability
ㆍ 2025/04/15 Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Exploit | 16 | ▼ -3 (-19%) |
2 | Malware | 10 | ▲ 2 (20%) |
3 | attack | 8 | ▲ 2 (25%) |
4 | RCE | 7 | ▲ 5 (71%) |
5 | Vulnerability | 6 | ▼ -1 (-17%) |
6 | Report | 6 | ▲ 2 (33%) |
7 | Operation | 5 | ▲ 3 (60%) |
8 | Update | 5 | ▼ -2 (-40%) |
9 | Windows | 4 | ▲ 1 (25%) |
10 | Microsoft | 3 | ▼ -1 (-33%) |
11 | flaw | 2 | ▲ 1 (50%) |
12 | intelligence | 2 | ▲ 1 (50%) |
13 | CentreStack | 2 | ▲ 2 (100%) |
14 | Advertising | 2 | ▼ -1 (-50%) |
15 | Software | 2 | ▼ -1 (-50%) |
16 | CVSS | 2 | ▲ 1 (50%) |
17 | VPN | 2 | ▲ 1 (50%) |
18 | hijack | 2 | ▲ 1 (50%) |
19 | link | 2 | ▲ new |
20 | Critical | 2 | ▲ 1 (50%) |
21 | AI | 2 | ▲ 2 (100%) |
22 | Phishing | 2 | - 0 (0%) |
23 | file | 2 | ▲ 2 (100%) |
24 | target | 2 | ▼ -2 (-100%) |
25 | Ransomware | 2 | ▼ -1 (-50%) |
26 | Ivanti | 2 | ▲ 2 (100%) |
27 | return | 1 | ▲ new |
28 | getshared | 1 | ▲ new |
29 | ltlt | 1 | ▲ new |
30 | Black Hat | 1 | ▲ 1 (100%) |
31 | execution | 1 | ▲ new |
32 | thread | 1 | ▲ new |
33 | Red Team | 1 | ▲ 1 (100%) |
34 | Hijacking | 1 | ▲ new |
35 | hooking | 1 | ▲ new |
36 | PoC | 1 | ▲ 1 (100%) |
37 | 세이프브리치 | 1 | ▲ new |
38 | GitHub | 1 | ▲ 1 (100%) |
39 | Vawtrak | 1 | ▲ 1 (100%) |
40 | legitlooking | 1 | ▲ new |
41 | Ransomwares | 1 | ▲ new |
42 | 1 | - 0 (0%) | |
43 | ZeroDay | 1 | ▼ -2 (-200%) |
44 | remediation | 1 | ▲ new |
45 | IoT | 1 | ▲ new |
46 | Takedown | 1 | ▲ 1 (100%) |
47 | Campaign | 1 | ▼ -2 (-200%) |
48 | Exploitation | 1 | - 0 (0%) |
49 | Active | 1 | ▲ 1 (100%) |
50 | Triofox | 1 | ▲ new |
51 | Cryptographic key | 1 | ▲ 1 (100%) |
52 | powershell | 1 | - 0 (0%) |
53 | familiar | 1 | ▲ new |
54 | Gladinets | 1 | ▲ new |
55 | Alert | 1 | ▲ 1 (100%) |
56 | Tenable | 1 | ▲ 1 (100%) |
57 | Akira | 1 | ▲ new |
58 | Squad | 1 | ▲ new |
59 | DarkAtlas | 1 | ▲ new |
60 | service | 1 | ▲ new |
61 | filesharing | 1 | ▲ new |
62 | Alureon | 1 | ▲ new |
63 | Defender | 1 | ▲ new |
64 | Check Point | 1 | ▲ 1 (100%) |
65 | Exploits | 1 | ▲ 1 (100%) |
66 | cloud | 1 | ▲ 1 (100%) |
67 | GameoverP2P | 1 | - 0 (0%) |
68 | MWNEWS | 1 | - 0 (0%) |
69 | code | 1 | - 0 (0%) |
70 | Mandiant | 1 | ▲ new |
71 | Rapid7 | 1 | ▲ 1 (100%) |
72 | China | 1 | - 0 (0%) |
73 | Recap | 1 | ▲ 1 (100%) |
74 | posture | 1 | ▲ new |
75 | Weekly | 1 | ▲ 1 (100%) |
76 | Faster | 1 | ▲ new |
77 | Evolve | 1 | ▲ new |
78 | Era | 1 | ▲ new |
79 | systemic | 1 | ▲ new |
80 | symptom | 1 | ▲ new |
81 | problem | 1 | ▲ new |
82 | network | 1 | ▲ 1 (100%) |
83 | CSPM | 1 | ▲ new |
84 | archive | 1 | ▲ 1 (100%) |
85 | EDR | 1 | ▲ 1 (100%) |
86 | kit | 1 | ▲ new |
87 | United States | 1 | ▼ -2 (-200%) |
88 | Emotet | 1 | ▲ new |
89 | folder | 1 | ▲ new |
90 | Victim | 1 | - 0 (0%) |
91 | fuel | 1 | ▲ new |
92 | PhaaS | 1 | ▲ new |
93 | Stealthier | 1 | ▲ new |
94 | Tycoon | 1 | ▲ new |
95 | detection | 1 | ▲ new |
96 | integration | 1 | ▲ new |
97 | Logpoint | 1 | ▲ new |
98 | XDR | 1 | ▲ 1 (100%) |
99 | FortiGate | 1 | ▲ 1 (100%) |
100 | CVE | 1 | - 0 (0%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
2 (28.6%) |
Vawtrak |
|
1 (14.3%) |
Akira |
|
1 (14.3%) |
Alureon |
|
1 (14.3%) |
GameoverP2P |
|
1 (14.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Microsoft |
|
3 (27.3%) |
세이프브리치 |
|
1 (9.1%) |
Tenable |
|
1 (9.1%) |
Check Point |
|
1 (9.1%) |
Mandiant |
|
1 (9.1%) |
Threat info
Last 5SNS
(Total : 4)Exploit Ransomware attack Attacker Malware Akira RCE powershell CVSS Report Windows Email Criminal Advertising ZeroDay
News
(Total : 12)Exploit Malware Attacker RCE Vulnerability attack Report Update Operation Windows Microsoft intelligence target Software hijack VPN Phishing EDR Check Point Tenable hooking Vawtrak United States GitHub 세이프브리치 Advertising PoC Emotet Alureon Hijacking CVSS Campaign Cryptographic key Takedown Red Team IoT Black Hat XDR Victim China Rapid7 Mandiant GameoverP2P Fortinet CVE
No | Title | Date |
---|---|---|
1 | Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow - Malware.News | 2025.04.15 |
2 | Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability - The Hacker News | 2025.04.15 |
3 | Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Malware.News | 2025.04.15 |
4 | No, it’s not OK to delete that new inetpub folder - Malware.News | 2025.04.14 |
5 | Announcing a new integration between Logpoint and Microsoft Defender XDR - Malware.News | 2025.04.14 |
Additional information
No | Title | Date |
---|---|---|
1 | Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow - Malware.News | 2025.04.15 |
2 | Colleges and Schools Now Top Targets for Online Threat Actors - Malware.News | 2025.04.15 |
3 | Trump Revenge Tour Targets Cyber Leaders, Elections - Malware.News | 2025.04.15 |
4 | GenAI vulnerabilities fixed only 21% of the time after pentesting - Malware.News | 2025.04.15 |
5 | Meta slurps up EU user data for AI training - Malware.News | 2025.04.15 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Malware.News | 2025.04.15 |
2 | Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Malware.News | 2025.04.15 |
3 | Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Malware.News | 2025.04.15 |
4 | Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Malware.News | 2025.04.15 |
5 | No, it’s not OK to delete that new inetpub folder - Malware.News | 2025.04.14 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://091.sh/shell/coco.zip exploit php shell | US ![]() | CNSERVERS | Ash_XSS_1 | 2025.02.19 |
2 | https://onge.org/software/WAV_Phoneme_Data_Copier.zip exploit zip | US ![]() | CLOUDFLARENET | abus3reports | 2024.12.09 |
3 | http://87.120.84.38/txt/yugozxcvb.doc CVE_2018_0798 exploit RTF | BG ![]() | Sharcom Ltd. | Riordz | 2024.10.18 |
4 | http://146.56.118.137/m8.bin exploit marte | JP ![]() | abus3reports | 2024.10.18 | |
5 | http://91.92.246.65:8000/a9021da exploit opendir xml | BG ![]() | Natskovi & Sie Ltd. | abus3reports | 2024.09.29 |
View only the last 5 |