Summary: 2025/04/29 00:40
First reported date: 2014/05/21
Inquiry period : 2025/03/30 00:40 ~ 2025/04/29 00:40 (1 months), 27 search results
전 기간대비 4% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Red Hat Red Hat Linux Software 입니다.
악성코드 유형 DYEPACK Entropy BlackSuit Cryptocurrency Miner CoreDN 도 새롭게 확인됩니다.
공격자 DragonOK Anonymous 도 새롭게 확인됩니다.
공격기술 RCE hacking Hijacking hijack 도 새롭게 확인됩니다.
기관 및 기업 Microsoft CISA Cloudflare 도 새롭게 확인됩니다.
기타 NIST MWNEWS von Distribution Mehrere 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 [UPDATE] [mittel] Red Hat Enterprise Linux (Quarkus und Netty): Mehrere Schwachstellen
ㆍ 2025/04/23 Red Hat security advisory (AV25-221)
ㆍ 2025/04/22 [NEU] [mittel] Red Hat Enterprise Linux (virtuoso-opensource): Schwachstelle ermöglicht Denial of Service
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Red Hat | 27 | ▲ 1 (4%) |
2 | Red | 20 | ▲ 2 (10%) |
3 | Hat | 20 | ▲ 3 (15%) |
4 | Update | 14 | ▼ -2 (-14%) |
5 | Linux | 13 | ▲ 5 (38%) |
6 | Enterprise | 9 | - 0 (0%) |
7 | Malware | 7 | ▼ -1 (-14%) |
8 | Software | 4 | ▲ 2 (50%) |
9 | Exploit | 4 | ▲ 2 (50%) |
10 | RCE | 4 | ▲ new |
11 | Schwachstellen | 4 | ▲ 2 (50%) |
12 | NIST | 3 | ▲ new |
13 | Platform | 3 | ▲ 2 (67%) |
14 | OpenShift | 3 | ▼ -1 (-33%) |
15 | advisory | 3 | - 0 (0%) |
16 | Schwachstelle | 3 | ▼ -2 (-67%) |
17 | Zusammenfassung | 3 | ▲ 1 (33%) |
18 | Vulnerability | 3 | ▼ -1 (-33%) |
19 | attack | 3 | ▲ 1 (33%) |
20 | Sicherheitsnews | 3 | ▲ 1 (33%) |
21 | taegliche | 3 | ▲ 1 (33%) |
22 | Report | 3 | ▲ 1 (33%) |
23 | United States | 3 | ▲ 1 (33%) |
24 | DNS | 2 | ▲ 1 (50%) |
25 | MWNEWS | 2 | ▲ new |
26 | von | 2 | ▲ new |
27 | Distribution | 2 | ▲ new |
28 | Microsoft | 2 | ▲ new |
29 | Automation | 2 | ▲ 1 (50%) |
30 | Ansible | 2 | ▲ 1 (50%) |
31 | Mehrere | 2 | ▲ new |
32 | Quarkus | 2 | ▲ new |
33 | GitHub | 2 | ▲ 1 (50%) |
34 | DYEPACK | 2 | ▲ new |
35 | 2 | ▲ 1 (50%) | |
36 | Advertising | 2 | ▼ -1 (-50%) |
37 | intelligence | 2 | - 0 (0%) |
38 | target | 2 | ▼ -1 (-50%) |
39 | Cryptographic key | 1 | ▲ new |
40 | Password | 1 | ▲ new |
41 | QRNGs | 1 | ▲ new |
42 | random | 1 | ▲ new |
43 | Kubernetes | 1 | - 0 (0%) |
44 | Cyber Caliphate Army | 1 | ▲ new |
45 | IoT | 1 | ▲ new |
46 | QRNG | 1 | ▲ new |
47 | Entropy | 1 | ▲ new |
48 | Ope | 1 | ▲ new |
49 | DragonOK | 1 | ▲ new |
50 | quantum | 1 | ▲ new |
51 | randomness | 1 | ▲ new |
52 | pam | 1 | ▲ new |
53 | Data Center | 1 | - 0 (0%) |
54 | modauthopenidc | 1 | ▲ new |
55 | BlackSuit | 1 | ▲ new |
56 | hacking | 1 | ▲ new |
57 | CISA | 1 | ▲ new |
58 | Government | 1 | - 0 (0%) |
59 | Operation | 1 | ▼ -1 (-100%) |
60 | CVE | 1 | - 0 (0%) |
61 | MITRE | 1 | ▲ new |
62 | Program | 1 | ▲ new |
63 | virtuosoopensource | 1 | ▲ new |
64 | last | 1 | ▲ new |
65 | Hijacking | 1 | ▲ new |
66 | Spring | 1 | ▲ new |
67 | Cloudflare | 1 | ▲ new |
68 | Integration | 1 | ▲ new |
69 | Windows | 1 | ▲ new |
70 | Ubuntu | 1 | - 0 (0%) |
71 | 1 | - 0 (0%) | |
72 | 1 | - 0 (0%) | |
73 | Remote Code Execution | 1 | ▼ -3 (-300%) |
74 | Firmware | 1 | ▲ new |
75 | Operatio | 1 | ▲ new |
76 | AV25176 | 1 | ▲ new |
77 | Satellite | 1 | ▲ new |
78 | JBoss | 1 | ▼ -1 (-100%) |
79 | Application | 1 | ▼ -1 (-100%) |
80 | Camel | 1 | ▲ new |
81 | hijack | 1 | ▲ new |
82 | build | 1 | ▲ new |
83 | WinRAR | 1 | ▲ new |
84 | Tempo | 1 | ▲ new |
85 | Android | 1 | ▲ new |
86 | Container | 1 | ▼ -1 (-100%) |
87 | Cryptocurrency Miner | 1 | ▲ new |
88 | CVSS | 1 | - 0 (0%) |
89 | Forensics | 1 | ▲ new |
90 | Campaign | 1 | - 0 (0%) |
91 | CoreDN | 1 | ▲ new |
92 | Anonymous | 1 | ▲ new |
93 | Backdoor | 1 | ▼ -1 (-100%) |
94 | DDoS | 1 | ▼ -3 (-300%) |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
DYEPACK |
|
2 (33.3%) |
Entropy |
|
1 (16.7%) |
BlackSuit |
|
1 (16.7%) |
Cryptocurrency Miner |
|
1 (16.7%) |
CoreDN |
|
1 (16.7%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
4 (26.7%) |
RCE |
|
4 (26.7%) |
hacking |
|
1 (6.7%) |
Hijacking |
|
1 (6.7%) |
Remote Code Execution |
|
1 (6.7%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
3 (33.3%) |
Microsoft |
|
2 (22.2%) |
CISA |
|
1 (11.1%) |
Government |
|
1 (11.1%) |
Cloudflare |
|
1 (11.1%) |
Threat info
Last 5SNS
(Total : 0)No data.
News
(Total : 27)Red Hat Update Linux Malware Software Exploit RCE Attacker NIST Vulnerability attack Report United States DNS Distribution Microsoft GitHub DYEPACK LinkedIn Advertising intelligence target Cryptographic key Password Kubernetes Cyber Caliphate Army IoT Entropy DragonOK Data Center BlackSuit hacking CISA Government Operation CVE Hijacking Cloudflare Windows Ubuntu Twitter Google Remote Code Execution Firmware hijack WinRAR Android Cryptocurrency Miner CVSS Forensics Campaign CoreDN Anonymous Backdoor DDoS
No | Title | Date |
---|---|---|
1 | IT Sicherheitsnews taegliche Zusammenfassung 2025-04-28 15h : 7 posts - IT Sicherheitsnews | 2025.04.28 |
2 | [UPDATE] [mittel] Red Hat Enterprise Linux (Quarkus und Netty): Mehrere Schwachstellen - IT Sicherheitsnews | 2025.04.28 |
3 | Red Hat security advisory (AV25-221) - Malware.News | 2025.04.23 |
4 | [NEU] [mittel] Red Hat Enterprise Linux (virtuoso-opensource): Schwachstelle ermöglicht Denial of Service - IT Sicherheitsnews | 2025.04.22 |
5 | CVE wake-up call: What’s ahead after the MITRE funding fiasco - Malware.News | 2025.04.17 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | CVE wake-up call: What’s ahead after the MITRE funding fiasco - Malware.News | 2025.04.17 |
2 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
3 | Kubernetes Threat Hunting using API Server Audit Logs - Malware.News | 2025.04.15 |
4 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Malware.News | 2025.04.01 |
5 | Analyzing open-source bootloaders: Finding vulnerabilities faster with AI - Malware.News | 2025.04.01 |
View only the last 5 |