Summary: 2025/04/29 00:25
First reported date: 2014/05/16
Inquiry period : 2025/03/30 00:25 ~ 2025/04/29 00:25 (1 months), 21 search results
전 기간대비 52% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 NIST Malware Software Vulnerability attack 입니다.
악성코드 유형 DYEPACK Vawtrak Entropy Trojan BlackSuit 도 새롭게 확인됩니다.
공격자 DragonOK 도 새롭게 확인됩니다.
공격기술 RCE hacking Backdoor 도 새롭게 확인됩니다.
기관 및 기업 Microsoft South Korea RaonSecure KISA Europe NSA Qualys ESET Okta Russia Kaspersky 도 새롭게 확인됩니다.
기타 ML CVEs IoT Advertising LinkedIn 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/26 What is the xBOM?
ㆍ 2025/04/25 Secure Your AI Supply Chain with the New ML-BOM
ㆍ 2025/04/23 Changes to CVE program are a call to action on your AppSec strategy
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | NIST | 21 | ▲ 11 (52%) |
2 | Malware | 15 | ▲ 10 (67%) |
3 | Software | 10 | ▲ 8 (80%) |
4 | Vulnerability | 10 | ▲ 6 (60%) |
5 | attack | 10 | ▲ 6 (60%) |
6 | Exploit | 10 | ▲ 6 (60%) |
7 | intelligence | 8 | ▲ 6 (75%) |
8 | Update | 8 | ▲ 6 (75%) |
9 | Supply chain | 8 | ▲ 6 (75%) |
10 | Report | 7 | ▲ 2 (29%) |
11 | RCE | 6 | ▲ new |
12 | GitHub | 6 | ▲ 5 (83%) |
13 | United States | 6 | ▲ 2 (33%) |
14 | target | 5 | ▲ 4 (80%) |
15 | Operation | 5 | ▲ 1 (20%) |
16 | Remote Code Execution | 5 | ▲ 1 (20%) |
17 | CISA | 4 | ▲ 2 (50%) |
18 | AI | 4 | ▲ 3 (75%) |
19 | ML | 3 | ▲ new |
20 | Education | 3 | ▼ -1 (-33%) |
21 | Government | 3 | - 0 (0%) |
22 | CVEs | 3 | ▲ new |
23 | IoT | 3 | ▲ new |
24 | DYEPACK | 3 | ▲ new |
25 | CVE | 3 | ▲ 2 (67%) |
26 | Campaign | 3 | ▲ 1 (33%) |
27 | Advertising | 3 | ▲ new |
28 | 3 | ▲ new | |
29 | Red Hat | 3 | ▲ new |
30 | Windows | 3 | ▲ new |
31 | Linux | 3 | ▲ new |
32 | Microsoft | 3 | ▲ new |
33 | Distribution | 3 | ▲ new |
34 | service | 2 | ▲ new |
35 | Program | 2 | ▲ new |
36 | business | 2 | ▲ new |
37 | GameoverP2P | 2 | - 0 (0%) |
38 | adversarial | 2 | ▲ new |
39 | guidance | 2 | ▲ new |
40 | Ransomware | 2 | ▲ 1 (50%) |
41 | hacking | 2 | ▲ new |
42 | Takedown | 2 | ▲ 1 (50%) |
43 | compliance | 2 | ▲ 1 (50%) |
44 | Vawtrak | 2 | ▲ new |
45 | MWNEWS | 2 | ▲ new |
46 | Firmware | 2 | ▲ new |
47 | South Korea | 2 | ▲ new |
48 | Password | 1 | ▲ new |
49 | 기술 | 1 | - 0 (0%) |
50 | 아이 | 1 | - 0 (0%) |
51 | RaonSecure | 1 | ▲ new |
52 | KISA | 1 | ▲ new |
53 | Cryptographic key | 1 | ▲ new |
54 | 선정 | 1 | ▲ new |
55 | QRNGs | 1 | ▲ new |
56 | Entropy | 1 | ▲ new |
57 | 암호 | 1 | - 0 (0%) |
58 | 양자 | 1 | - 0 (0%) |
59 | 큐어 | 1 | ▲ new |
60 | Cyber Caliphate Army | 1 | ▲ new |
61 | 사업 | 1 | ▲ new |
62 | Ministry of Science and ICT | 1 | ▲ new |
63 | DragonOK | 1 | ▲ new |
64 | random | 1 | ▲ new |
65 | governance | 1 | ▲ new |
66 | Materials | 1 | ▲ new |
67 | Bill | 1 | - 0 (0%) |
68 | Europe | 1 | ▲ new |
69 | model | 1 | ▲ new |
70 | MLBOM | 1 | ▲ new |
71 | Trojan | 1 | ▲ new |
72 | Backdoor | 1 | ▲ new |
73 | ChatGPT | 1 | - 0 (0%) |
74 | NSA | 1 | ▲ new |
75 | Qualys | 1 | ▲ new |
76 | Cloud | 1 | ▲ new |
77 | QRNG | 1 | ▲ new |
78 | Shah | 1 | ▲ new |
79 | 솔루션 | 1 | - 0 (0%) |
80 | Phishing | 1 | - 0 (0%) |
81 | CSCRM | 1 | ▲ new |
82 | amp | 1 | ▲ new |
83 | Downstream | 1 | ▲ new |
84 | MITRE | 1 | ▲ new |
85 | BlackSuit | 1 | ▲ new |
86 | randomness | 1 | ▲ new |
87 | quantum | 1 | ▲ new |
88 | 출시 | 1 | ▲ new |
89 | China | 1 | ▲ new |
90 | PQC | 1 | - 0 (0%) |
91 | Java | 1 | ▲ new |
92 | ESET | 1 | ▲ new |
93 | Okta | 1 | ▲ new |
94 | RATel | 1 | - 0 (0%) |
95 | c&c | 1 | ▲ new |
96 | Russia | 1 | ▲ new |
97 | Kaspersky | 1 | ▲ new |
98 | confident | 1 | ▲ new |
99 | feel | 1 | ▲ new |
100 | NVD | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
DYEPACK |
|
3 (23.1%) |
GameoverP2P |
|
2 (15.4%) |
Ransomware |
|
2 (15.4%) |
Vawtrak |
|
2 (15.4%) |
Entropy |
|
1 (7.7%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
DragonOK |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
10 (35.7%) |
RCE |
|
6 (21.4%) |
Remote Code Execution |
|
5 (17.9%) |
Campaign |
|
3 (10.7%) |
hacking |
|
2 (7.1%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
6 (22.2%) |
CISA |
|
4 (14.8%) |
Government |
|
3 (11.1%) |
Microsoft |
|
3 (11.1%) |
South Korea |
|
2 (7.4%) |
Threat info
Last 5SNS
(Total : 1)News
(Total : 20)NIST Malware Software attack Exploit Vulnerability Update intelligence Supply chain Report Attacker RCE United States GitHub Operation target Remote Code Execution CISA IoT CVE CVEs DYEPACK Government Education Campaign Advertising Red Hat Windows Linux Distribution Microsoft LinkedIn GameoverP2P Takedown hacking Ransomware South Korea Vawtrak Firmware Password Cryptographic key RaonSecure Entropy KISA Cyber Caliphate Army DragonOK Europe Trojan Backdoor ChatGPT NSA Qualys Phishing BlackSuit Criminal Java plugin Kubernetes ESET Okta RATel c&c Russia Kaspersky CVSS ...
No | Title | Date |
---|---|---|
1 | What is the xBOM? - Malware.News | 2025.04.26 |
2 | Secure Your AI Supply Chain with the New ML-BOM - Malware.News | 2025.04.25 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | Cloud governance key to enterprise security success - Malware.News | 2025.04.22 |
5 | NIST's adversarial ML guidance: 6 action items for your security team - Malware.News | 2025.04.18 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
2 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | CVE wake-up call: What’s ahead after the MITRE funding fiasco - Malware.News | 2025.04.17 |
5 | 라온시큐어 컨소시엄, 과기정통부 양자내성암호 시범사업 선정 - 데일리시큐 | 2025.04.15 |
View only the last 5 |