Summary: 2025/04/29 01:45
First reported date: 2010/05/28
Inquiry period : 2025/04/28 01:45 ~ 2025/04/29 01:45 (1 days), 3 search results
지난 7일 기간대비 동일한 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 SAP target PoC 입니다.
기관 및 기업 Rapid7 도 새롭게 확인됩니다.
기타 MDR vuln April Thursday Vulnerabilities 등 신규 키워드도 확인됩니다.
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | CVE | 3 | - 0 (0%) |
2 | Vulnerability | 3 | - 0 (0%) |
3 | SAP | 1 | ▲ 1 (100%) |
4 | target | 1 | ▲ 1 (100%) |
5 | MDR | 1 | ▲ new |
6 | Rapid7 | 1 | ▲ new |
7 | vuln | 1 | ▲ new |
8 | April | 1 | ▲ new |
9 | Thursday | 1 | ▲ new |
10 | Vulnerabilities | 1 | ▲ new |
11 | Leave | 1 | ▲ new |
12 | mode | 1 | ▲ new |
13 | Riva | 1 | ▲ new |
14 | NVIDIA | 1 | ▲ new |
15 | RCE | 1 | ▼ -1 (-100%) |
16 | PoC | 1 | ▲ 1 (100%) |
17 | React | 1 | ▲ new |
18 | Alert | 1 | - 0 (0%) |
19 | Exploit | 1 | - 0 (0%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Rapid7 |
|
1 (100%) |
Threat info
Last 5SNS
(Total : 2)CVE Vulnerability PoC Rapid7 MDR target Exploit
News
(Total : 1)No | Title | Date |
---|---|---|
1 | NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk - TrendMicro | 2025.04.28 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) - FortiGuard Labs | 2025.04.25 |
2 | CVE-2025-34028: PoC Released for Critical RCE Vulnerability in Commvault Command Center - Malware.News | 2025.04.25 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
5 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CVE MS-MSDT AntiDebug AntiVM PNG Format MSOffice File JPEG Format | f6febdcc05cc9e04e4119c83e1afa2c8 | 30083 | 2022.08.02 |
2 | ![]() Formbook CVE MS-MSDT Word 2007 file format(docx) | 730768c4f029608adf0032e95e8e8a1d | 29851 | 2022.07.26 |
3 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | cdd33ffa502cbffec6e64c4574846a89 | 29852 | 2022.07.26 |
4 | ![]() CVE MS-MSDT AntiDebug AntiVM MSOffice File | 465585177a642d88295d7f0a55b8984c | 29868 | 2022.07.26 |
5 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | e7bde7d2b74218b4faf98d5f45b86593 | 29669 | 2022.07.20 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 29 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |