Summary: 2025/04/29 00:42
First reported date: 2017/09/19
Inquiry period : 2025/03/30 00:42 ~ 2025/04/29 00:42 (1 months), 73 search results
전 기간대비 -3% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Software Update Chain Operation AI 입니다.
공격기술 RCE 도 새롭게 확인됩니다.
기관 및 기업 France 도 새롭게 확인됩니다.
기타 ML library alert Materials Takedown 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types
ㆍ 2025/04/26 How SBOMs power secure software acquisition | Sonatype Blog
ㆍ 2025/04/26 What is the xBOM?
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Supply chain | 73 | ▼ -2 (-3%) |
2 | Malware | 38 | ▼ -12 (-32%) |
3 | attack | 37 | ▼ -16 (-43%) |
4 | Software | 28 | ▲ 1 (4%) |
5 | Supply | 21 | - 0 (0%) |
6 | Update | 19 | ▲ 1 (5%) |
7 | Report | 19 | - 0 (0%) |
8 | Chain | 18 | ▲ 5 (28%) |
9 | Exploit | 16 | ▼ -11 (-69%) |
10 | target | 16 | ▼ -12 (-75%) |
11 | Operation | 15 | ▲ 3 (20%) |
12 | RCE | 14 | ▲ new |
13 | intelligence | 14 | - 0 (0%) |
14 | Vulnerability | 11 | ▼ -6 (-55%) |
15 | GitHub | 11 | ▼ -6 (-55%) |
16 | Campaign | 10 | ▼ -9 (-90%) |
17 | United States | 10 | ▼ -1 (-10%) |
18 | AI | 10 | ▲ 1 (10%) |
19 | Remote Code Execution | 9 | ▼ -17 (-189%) |
20 | NIST | 8 | ▲ 6 (75%) |
21 | Cryptocurrency | 7 | ▲ 3 (43%) |
22 | Government | 7 | ▼ -4 (-57%) |
23 | Phishing | 7 | ▲ 1 (14%) |
24 | Ransomware | 7 | - 0 (0%) |
25 | CISA | 7 | ▼ -1 (-14%) |
26 | Backdoor | 6 | ▼ -4 (-67%) |
27 | Education | 6 | ▼ -4 (-67%) |
28 | Advertising | 6 | ▼ -4 (-67%) |
29 | Criminal | 6 | ▼ -3 (-50%) |
30 | Malicious | 5 | ▼ -1 (-20%) |
31 | Victim | 5 | - 0 (0%) |
32 | hacking | 5 | ▼ -2 (-40%) |
33 | Microsoft | 5 | ▼ -5 (-100%) |
34 | ML | 5 | ▲ new |
35 | Kaspersky | 5 | ▲ 4 (80%) |
36 | Firmware | 4 | ▼ -2 (-50%) |
37 | KASAP | 4 | ▲ 3 (75%) |
38 | Java | 4 | ▲ 2 (50%) |
39 | CVE | 4 | ▲ 1 (25%) |
40 | npm | 4 | ▲ 2 (50%) |
41 | ChatGPT | 4 | ▲ 1 (25%) |
42 | Attacks | 4 | ▲ 3 (75%) |
43 | Coinbase | 4 | ▲ 1 (25%) |
44 | Package | 4 | ▲ 1 (25%) |
45 | VPN | 3 | - 0 (0%) |
46 | CVSS | 3 | ▼ -1 (-33%) |
47 | library | 3 | ▲ new |
48 | DYEPACK | 3 | ▲ 1 (33%) |
49 | alert | 3 | ▲ new |
50 | Distribution | 3 | ▲ 1 (33%) |
51 | Secure | 3 | ▲ 2 (67%) |
52 | code | 3 | ▼ -3 (-100%) |
53 | Apple | 3 | ▲ 2 (67%) |
54 | Europe | 3 | ▲ 2 (67%) |
55 | access | 3 | ▼ -1 (-33%) |
56 | China | 3 | ▼ -7 (-233%) |
57 | Social Engineering | 3 | ▲ 2 (67%) |
58 | IoT | 3 | ▲ 2 (67%) |
59 | Materials | 2 | ▲ new |
60 | Takedown | 2 | ▲ new |
61 | France | 2 | ▲ new |
62 | Telegram | 2 | ▲ new |
63 | 2 | - 0 (0%) | |
64 | race | 2 | ▲ new |
65 | model | 2 | - 0 (0%) |
66 | Bill | 2 | ▲ new |
67 | 2 | ▼ -1 (-50%) | |
68 | Targets | 2 | ▲ new |
69 | xBOM | 2 | ▲ new |
70 | MWNEWS | 2 | ▼ -1 (-50%) |
71 | arrest | 2 | ▲ new |
72 | AIML | 2 | ▲ new |
73 | Tariffs | 2 | ▲ new |
74 | hijack | 2 | - 0 (0%) |
75 | SolarWinds | 2 | ▲ new |
76 | risk | 2 | ▼ -2 (-100%) |
77 | Trump | 2 | ▲ new |
78 | Whole | 2 | ▲ new |
79 | Electronic | 2 | ▲ new |
80 | Trojan | 2 | - 0 (0%) |
81 | thirdparty | 2 | - 0 (0%) |
82 | MITRE | 2 | ▲ new |
83 | Docker | 2 | ▲ 1 (50%) |
84 | DNS | 2 | ▲ new |
85 | Vawtrak | 2 | - 0 (0%) |
86 | Ubuntu | 2 | ▲ 1 (50%) |
87 | NSA | 2 | ▲ 1 (50%) |
88 | program | 2 | ▲ 1 (50%) |
89 | Hardware | 2 | - 0 (0%) |
90 | Linux | 2 | ▲ 1 (50%) |
91 | xrpljs | 2 | ▲ new |
92 | critical | 2 | ▲ 1 (50%) |
93 | SpotBugs | 2 | ▲ new |
94 | token | 2 | ▲ new |
95 | CVEs | 2 | ▲ new |
96 | securityaffairs | 2 | ▲ 1 (50%) |
97 | Recent | 2 | ▲ 1 (50%) |
98 | Ripple | 2 | ▲ new |
99 | 2 | ▼ -3 (-150%) | |
100 | iPhone | 2 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
7 (46.7%) |
DYEPACK |
|
3 (20%) |
Trojan |
|
2 (13.3%) |
Vawtrak |
|
2 (13.3%) |
RansomHouse |
|
1 (6.7%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
1 (100%) |

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
16 (21.9%) |
RCE |
|
14 (19.2%) |
Campaign |
|
10 (13.7%) |
Remote Code Execution |
|
9 (12.3%) |
Phishing |
|
7 (9.6%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
10 (18.2%) |
Government |
|
7 (12.7%) |
CISA |
|
7 (12.7%) |
Microsoft |
|
5 (9.1%) |
Kaspersky |
|
5 (9.1%) |
Threat info
Last 5SNS
(Total : 20)Supply chain attack Update Kaspersky Malware Attacks Phishing hacking Backdoor Victim Ransomware GitHub target Cryptocurrency Telegram RansomHouse Java Operation Lazarus APT Campaign South Korea RCE Report Advertising hijack US Android United States Exploit VPN Coinbase Software
News
(Total : 53)Supply chain Malware Software attack Report Exploit intelligence Operation target Attacker Update RCE Vulnerability Campaign GitHub Remote Code Execution United States NIST CISA Government Education Cryptocurrency Criminal Advertising Ransomware Microsoft Firmware ChatGPT Backdoor CVE Apple CVSS Distribution Java DYEPACK Victim hacking Phishing IoT Europe Social Engineering China Coinbase Takedown Docker DNS Ubuntu iPhone SolarWinds Google arrest France VPN NSA Trojan Linux Vawtrak LinkedIn Email CVEs Blister ...
No | Title | Date |
---|---|---|
1 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
2 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
3 | What is the xBOM? - Malware.News | 2025.04.26 |
4 | What is the xBOM? - ReversingLabs Blog | 2025.04.26 |
5 | Secure Your AI Supply Chain with the New ML-BOM - Malware.News | 2025.04.25 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
2 | Bruce Byrd on Public-Private Partnerships in Cybersecurity - Malware.News | 2025.04.25 |
3 | Verizon 2025 DBIR: Third-party software risk takes the spotlight - Malware.News | 2025.04.25 |
4 | Verizon 2025 DBIR: Third-party software risk takes the spotlight - Malware.News | 2025.04.25 |
5 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
View only the last 5 |