Summary: 2025/04/28 21:39
First reported date: 2010/05/28
Inquiry period : 2025/03/29 21:38 ~ 2025/04/28 21:38 (1 months), 117 search results
전 기간대비 30% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 CVE Vulnerability Exploit Update Malware 입니다.
공격기술 APT hijack 도 새롭게 확인됩니다.
기관 및 기업 SECUI AhnLab North Korea dprk 도 새롭게 확인됩니다.
기타 MITRE CrushFTP FortiGate Funding Ivanti 등 신규 키워드도 확인됩니다.
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk
ㆍ 2025/04/25 DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
ㆍ 2025/04/25 Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028)
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | CVE | 117 | ▲ 35 (30%) |
2 | Vulnerability | 116 | ▲ 34 (29%) |
3 | Exploit | 39 | ▲ 1 (3%) |
4 | Update | 33 | ▲ 6 (18%) |
5 | Malware | 33 | ▲ 7 (21%) |
6 | RCE | 26 | ▲ 20 (77%) |
7 | CISA | 22 | ▲ 16 (73%) |
8 | CVSS | 22 | ▼ -2 (-9%) |
9 | Alert | 19 | ▲ 7 (37%) |
10 | Report | 18 | ▲ 6 (33%) |
11 | Critical | 13 | ▲ 2 (15%) |
12 | program | 13 | ▲ 12 (92%) |
13 | attack | 12 | ▼ -8 (-67%) |
14 | Software | 12 | ▲ 2 (17%) |
15 | MITRE | 11 | ▲ new |
16 | Government | 10 | ▲ 9 (90%) |
17 | Operation | 9 | ▲ 2 (22%) |
18 | Remote Code Execution | 9 | ▼ -19 (-211%) |
19 | ZeroDay | 8 | ▼ -6 (-75%) |
20 | Windows | 8 | ▼ -1 (-13%) |
21 | flaw | 8 | ▲ 5 (63%) |
22 | hacking | 7 | ▲ 4 (57%) |
23 | Remote | 7 | ▲ 3 (43%) |
24 | intelligence | 7 | ▼ -3 (-43%) |
25 | target | 6 | ▼ -7 (-117%) |
26 | Fortinet | 6 | ▲ 5 (83%) |
27 | CrushFTP | 6 | ▲ new |
28 | securityaffairs | 6 | ▲ 4 (67%) |
29 | GitHub | 6 | ▲ 1 (17%) |
30 | PoC | 6 | ▲ 2 (33%) |
31 | access | 5 | - 0 (0%) |
32 | FortiGate | 5 | ▲ new |
33 | MWNEWS | 5 | ▲ 2 (40%) |
34 | wild | 5 | ▲ 4 (80%) |
35 | ThreatProtection | 5 | ▲ 1 (20%) |
36 | Microsoft | 5 | ▼ -2 (-40%) |
37 | Campaign | 5 | ▲ 4 (80%) |
38 | Apache | 4 | ▼ -4 (-100%) |
39 | Funding | 4 | ▲ new |
40 | Ivanti | 4 | ▲ new |
41 | NortonLifeLock | 4 | - 0 (0%) |
42 | DDoS | 4 | ▲ 2 (50%) |
43 | Cisco | 4 | - 0 (0%) |
44 | Supply chain | 4 | ▲ 1 (25%) |
45 | IoT | 4 | ▲ new |
46 | Java | 4 | ▲ 1 (25%) |
47 | Exploitation | 3 | ▲ new |
48 | NTLM | 3 | ▲ new |
49 | Register | 3 | ▲ new |
50 | Linux | 3 | - 0 (0%) |
51 | code | 3 | ▼ -1 (-33%) |
52 | SSH | 3 | ▲ new |
53 | 3 | ▲ new | |
54 | 3 | ▼ -2 (-67%) | |
55 | contract | 3 | ▲ new |
56 | 3 | ▲ new | |
57 | NIST | 3 | ▲ 2 (67%) |
58 | CVEs | 3 | ▲ new |
59 | Command | 3 | ▲ new |
60 | Allows | 2 | ▲ new |
61 | APT | 2 | ▲ new |
62 | continuity | 2 | ▲ new |
63 | extension | 2 | ▲ new |
64 | Old | 2 | ▲ new |
65 | cti | 2 | ▲ new |
66 | SECUI | 2 | ▲ new |
67 | AhnLab | 2 | ▲ new |
68 | North Korea | 2 | ▲ new |
69 | ErlangOTP | 2 | ▲ new |
70 | file | 2 | ▲ new |
71 | available | 2 | ▲ new |
72 | CISAs | 2 | ▲ new |
73 | MITREs | 2 | ▲ new |
74 | overflow | 2 | ▲ new |
75 | dprk | 2 | ▲ new |
76 | randomquery | 2 | ▲ new |
77 | recent | 2 | ▲ new |
78 | Larva | 2 | ▲ new |
79 | Telegram | 2 | ▲ new |
80 | vulnerable | 2 | ▲ new |
81 | Execution | 2 | ▲ 1 (50%) |
82 | Vite | 2 | ▲ new |
83 | Active | 2 | ▲ 1 (50%) |
84 | hijack | 2 | ▲ new |
85 | NVIDIA | 2 | ▲ new |
86 | disclosure | 2 | ▲ new |
87 | United States | 2 | - 0 (0%) |
88 | Docker | 2 | ▲ new |
89 | DYEPACK | 2 | ▼ -2 (-100%) |
90 | Gladinet | 2 | ▲ new |
91 | Education | 2 | ▲ 1 (50%) |
92 | Password | 2 | - 0 (0%) |
93 | Center | 2 | ▲ new |
94 | SAP | 2 | ▲ new |
95 | href | 2 | ▲ new |
96 | SHODAN | 2 | ▼ -1 (-50%) |
97 | Mandiant | 2 | ▲ 1 (50%) |
98 | amp | 2 | - 0 (0%) |
99 | Secure | 2 | ▲ new |
100 | Authentication | 2 | ▲ new |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
39 (41.5%) |
RCE |
|
26 (27.7%) |
Remote Code Execution |
|
9 (9.6%) |
hacking |
|
7 (7.4%) |
Campaign |
|
5 (5.3%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
CISA |
|
22 (33.3%) |
Government |
|
10 (15.2%) |
Fortinet |
|
6 (9.1%) |
Microsoft |
|
5 (7.6%) |
Cisco |
|
4 (6.1%) |
Threat info
Last 5SNS
(Total : 75)CVE Vulnerability Exploit Attacker Update CVSS RCE hacking CISA ZeroDay attack Report Malware Windows Remote Code Execution PoC Fortinet North Korea Telegram WhatsApp hijack dprk APT AhnLab Microsoft SSRF DDoS SECUI Cisco Campaign SHODAN iPhone Password Email ChatGPT Education WordPress ...
News
(Total : 42)Vulnerability CVE Malware Exploit Update RCE CISA Report CVSS Software Attacker Government Operation attack intelligence GitHub target Remote Code Execution Supply chain IoT Windows ZeroDay Linux Campaign NIST Microsoft Java LinkedIn CVEs Fortinet DYEPACK Cisco Commvault United States PoC DDoS Google VPN Red Hat hacking BlackSuit Distribution DslogdRAT Japan NetWireRC Vawtrak WhatsApp Docker DNS Ubuntu NSA Education Qualys Europe ...
No | Title | Date |
---|---|---|
1 | NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk - TrendMicro | 2025.04.28 |
2 | DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks - The Hacker News | 2025.04.25 |
3 | Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) - FortiGuard Labs | 2025.04.25 |
4 | CVE-2025-34028: PoC Released for Critical RCE Vulnerability in Commvault Command Center - Malware.News | 2025.04.25 |
5 | 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure - The Hacker News | 2025.04.24 |
Additional information
No | Title | Date |
---|---|---|
1 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
2 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
3 | IR Trends Q1 2025: Phishing soars as identity-based attacks persist - Malware.News | 2025.04.28 |
4 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
5 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) - FortiGuard Labs | 2025.04.25 |
2 | CVE-2025-34028: PoC Released for Critical RCE Vulnerability in Commvault Command Center - Malware.News | 2025.04.25 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
5 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CVE MS-MSDT AntiDebug AntiVM PNG Format MSOffice File JPEG Format | f6febdcc05cc9e04e4119c83e1afa2c8 | 30083 | 2022.08.02 |
2 | ![]() Formbook CVE MS-MSDT Word 2007 file format(docx) | 730768c4f029608adf0032e95e8e8a1d | 29851 | 2022.07.26 |
3 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | cdd33ffa502cbffec6e64c4574846a89 | 29852 | 2022.07.26 |
4 | ![]() CVE MS-MSDT AntiDebug AntiVM MSOffice File | 465585177a642d88295d7f0a55b8984c | 29868 | 2022.07.26 |
5 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | e7bde7d2b74218b4faf98d5f45b86593 | 29669 | 2022.07.20 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 29 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |