Summary: 2025/04/29 04:16

First reported date: 2009/03/28
Inquiry period : 2025/03/30 04:16 ~ 2025/04/29 04:16 (1 months), 28 search results

전 기간대비 -43% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
Exploit Windows Linux Distribution Email 입니다.
악성코드 유형 GameoverP2P Vawtrak 도 새롭게 확인됩니다.
기관 및 기업 apple Recorded Future United Kingdom 도 새롭게 확인됩니다.
기타 My Find Apples ios airtag 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/26 Navigating the 8D city: Why multi-dimensional network security is no longer optional
    ㆍ 2025/04/25 Security Data Paradox: When More Data Means Less Visibility
    ㆍ 2025/04/23 Sandfly 5.4 - Cisco and Juniper Network Device Support

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1Network 28 ▼ -12 (-43%)
2Malware 11 ▼ -8 (-73%)
3Exploit 7 ▲ 2 (29%)
4Operation 5 ▼ -2 (-40%)
5Windows 4 ▲ 3 (75%)
6Linux 4 ▲ 3 (75%)
7United States 4 - 0 (0%)
8attack 3 ▼ -2 (-67%)
9My 3 ▲ new
10GameoverP2P 3 ▲ new
11Distribution 3 ▲ 1 (33%)
12Microsoft 3 ▼ -3 (-100%)
13Find 3 ▲ new
14Apples 3 ▲ new
15ios 3 ▲ new
16airtag 3 ▲ new
17Android 3 ▲ new
18apple 3 ▲ new
19phone 3 ▲ new
20MWNEWS 2 ▼ -1 (-50%)
21Criminal 2 ▼ -5 (-250%)
22Email 2 ▲ 1 (50%)
23device 2 ▲ 1 (50%)
24EDR 2 - 0 (0%)
25target 2 ▼ -7 (-350%)
26Vawtrak 2 ▲ new
27Advertising 2 ▲ new
28Campaign 2 ▼ -1 (-50%)
29Ransomware 2 - 0 (0%)
30Report 2 ▼ -6 (-300%)
31access 2 - 0 (0%)
32VPN 2 - 0 (0%)
33intelligence 2 ▼ -2 (-100%)
34Education 2 ▲ 1 (50%)
35collaboration 2 ▲ new
36Malicious Traffic 2 ▲ new
37identity 2 ▲ new
38multidimensional 1 ▲ new
39visibility 1 ▲ new
40AI 1 ▼ -2 (-200%)
41secure 1 ▲ new
42Connecting 1 ▲ new
43Flex 1 ▲ new
44Muscles 1 ▲ new
45Basics 1 ▲ new
46systemic 1 ▲ new
47problem 1 ▲ new
48symptom 1 ▲ new
49Ivanti 1 ▲ new
50JPMorgan 1 ▲ new
51Pound 1 ▲ new
52Support 1 ▲ new
53Adds 1 ▲ new
54payment 1 ▲ new
55private 1 - 0 (0%)
56MPLS 1 ▲ new
57SASE 1 ▲ new
58Data 1 ▲ new
59Juniper 1 - 0 (0%)
60Protect 1 ▲ new
61cybercrime 1 ▼ -1 (-100%)
62Sandfly 1 ▲ new
63Tick 1 - 0 (0%)
64Cisco 1 - 0 (0%)
65Vulnerability 1 ▼ -3 (-300%)
66c&c 1 - 0 (0%)
67Data Center 1 ▼ -2 (-200%)
68Cyber Kill Chain 1 ▲ new
69lateral 1 ▲ new
70gateway 1 ▲ new
71Recorded Future 1 ▲ new
72production 1 ▲ new
73ProtectionHighlight 1 ▲ new
74ThreatProtection 1 ▲ new
75Capture 1 ▲ new
76Packet 1 ▲ new
77Web 1 ▲ new
78Hunt 1 ▲ new
79Red Team 1 - 0 (0%)
80threat 1 ▲ new
81isolation 1 ▲ new
82implement 1 ▲ new
83NortonLifeLock 1 ▲ new
84CubTiger 1 ▲ new
85Zero Trust 1 - 0 (0%)
86microsoftentra 1 ▲ new
87Guest 1 ▲ new
88Infraxploit 1 ▲ new
89mule 1 ▲ new
90Illegal 1 ▲ new
91Eurojust 1 ▲ new
92money 1 ▲ new
93arrest 1 - 0 (0%)
94United Kingdom 1 ▲ new
95management 1 ▲ new
96iam 1 ▲ new
97NN 1 ▲ new
98Meeting 1 ▲ new
99vector 1 - 0 (0%)
100ReLU 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
3 (37.5%)
Vawtrak
2 (25%)
Ransomware
2 (25%)
RATel
1 (12.5%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Tick
1 (100%)
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
7 (63.6%)
Campaign
2 (18.2%)
Remote Code Execution
1 (9.1%)
RCE
1 (9.1%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
United States
4 (28.6%)
Microsoft
3 (21.4%)
apple
3 (21.4%)
Cisco
1 (7.1%)
Recorded Future
1 (7.1%)
Threat info
Last 5

SNS

(Total : 9)
  Total keyword

Windows Exploit Linux Android apple Microsoft EDR Report GameoverP2P attack

No Title Date
1Threat Intelligence @threatintel
#ThreatProtection #ProtectionHighlight Obtaining an organization's credentials serves as a gateway to infiltrate the network and facilitate lateral movement. Symantec EDR effectively detects and exposes these attacks, read more: https://t.co/KFPyx8TKzU #Cybercrime #CyberSecurity https://t.co/AgOPez9
2025.04.23
2Microsoft Security @msftsecurity
Protect production networks and implement network isolation of internal and external resources. https://t.co/IGLIx10y8v
2025.04.18
3Microsoft Security @msftsecurity
Stronger collaboration between identity and network teams helps organizations better protect employees and resources. Read the secure access report by Microsoft and Hypothesis Group to learn more: https://t.co/xGi2270Dhq https://t.co/QDPqlePPGP
2025.04.17
4Kaspersky @kaspersky
Your phone might be tracking you—for hackers. And #Apple’s network is helping. ???? Apple’s Find My network can be exploited to remotely track other vendors’ #Android, #Windows, and #Linux devices. Full story ⇒ https://t.co/VtKrEF0DRS #AirTag #CyberSecurity #iOS https://t.co/fUAtl5qLsB
2025.04.15
5MalwareHunterTeam @malwrhunterteam
@txhaflaire Then a Windows sample, "Jianhe Network Technology (Shanghai) Co., Ltd." (SSL Corp given cert) signed, FUD on VT "VidoriumApp.exe": 4a6ae108cb5e4f038865e8ff7808e258b29124a74978f987683c7526cfc96132 From: https://t.co/dkyPTtR3nw
2025.04.11

Additional information

No data
No data
No data
No URL CC ASN Co Reporter Date
1http://66.70.242.174/b
network scanner
CA CAOVH SASabus3reports2024.09.24
Beta Service, If you select keyword, you can check detailed information.