Summary: 2025/04/29 06:29

First reported date: 2011/04/28
Inquiry period : 2025/03/30 06:29 ~ 2025/04/29 06:29 (1 months), 21 search results

전 기간대비 48% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는
real 입니다.
악성코드 유형 GameoverP2P Trojan 도 새롭게 확인됩니다.
공격기술 Exploit hijack Stealer 도 새롭게 확인됩니다.
기관 및 기업 Google North Korea Government CISA Canada United States Proofpoint 도 새롭게 확인됩니다.
기타 attack incident detection triggered key 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/23 Virtual Nodes, Real Waves: a Colpitts Walkthrough
    ㆍ 2025/04/18 Popular Chatbot-Ranking Website Is Becoming a Real Company
    ㆍ 2025/04/12 Canada Tech CEOs Urge ‘Real Debate’ on Economy Ahead of Vote

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1real 21 ▲ 10 (48%)
2attack 7 ▲ new
3incident 4 ▲ new
4Exploit 4 ▲ new
5detection 4 ▲ new
6triggered 4 ▲ new
7key 4 ▲ new
8Malware 3 ▲ new
9AI 3 ▲ new
10Google 2 ▲ new
11Email 2 ▲ new
12Victim 2 ▲ new
13GameoverP2P 2 ▲ new
14Hey 1 ▲ new
15Telegram 1 ▲ new
16Trojan 1 ▲ new
17SaaS 1 ▲ new
18question 1 ▲ new
19ChatGPT 1 ▲ new
20Hosted 1 ▲ new
21Vawtrak 1 - 0 (0%)
22Trojanized 1 ▲ new
23intelligence 1 ▲ new
24Popular 1 ▲ new
25ChatbotRanking 1 ▲ new
26Website 1 - 0 (0%)
27Hackers 1 ▲ new
28Taken 1 ▲ new
29Password 1 ▲ new
30Hijacked 1 ▲ new
31danger 1 ▲ new
32fictional 1 ▲ new
33April 1 ▲ new
34humancentricsecurity 1 ▲ new
35NationalSuperheroDay 1 ▲ new
36North Korea 1 ▲ new
37Korean 1 ▲ new
38North 1 ▲ new
39Fake 1 ▲ new
40IAX 1 ▲ new
41Walkthrough 1 ▲ new
42Colpitts 1 ▲ new
43Nodes 1 ▲ new
44Virtual 1 ▲ new
45tool 1 - 0 (0%)
46Illumio 1 ▲ new
47MWNEWS 1 ▲ new
48hijack 1 ▲ new
49Stealer 1 ▲ new
50worm 1 ▲ new
51iaxstealer 1 ▲ new
52lot 1 ▲ new
53challenge 1 ▲ new
54CTF 1 ▲ new
55Threat 1 - 0 (0%)
56GoogleCloudNext 1 ▲ new
57Government 1 ▲ new
58Kidflix 1 ▲ new
59bad 1 ▲ new
60CISA 1 ▲ new
61certificate 1 ▲ new
62Agentic 1 ▲ new
63Theyre 1 ▲ new
64httpstcowZuzKLc 1 ▲ new
65juicy 1 ▲ new
66Operation 1 ▲ new
67CSAM 1 ▲ new
68DarkWeb 1 - 0 (0%)
69Canada 1 ▲ new
70Down 1 ▲ new
71College 1 ▲ new
72Morris 1 ▲ new
73Zero Trust 1 ▲ new
74United States 1 ▲ new
75target 1 - 0 (0%)
76AIPowered 1 ▲ new
77Isnt 1 ▲ new
78Protester 1 ▲ new
79Criminal 1 - 0 (0%)
80Tech 1 ▲ new
81Report 1 ▲ new
82intel 1 ▲ new
83early 1 ▲ new
84Just 1 ▲ new
85time 1 ▼ -1 (-100%)
86Urge 1 ▲ new
87CEOs 1 ▲ new
88Proofpoint 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


Keyword Average Label
GameoverP2P
2 (50%)
Trojan
1 (25%)
Vawtrak
1 (25%)
Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
4 (66.7%)
hijack
1 (16.7%)
Stealer
1 (16.7%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Google
2 (25%)
North Korea
1 (12.5%)
Government
1 (12.5%)
CISA
1 (12.5%)
Canada
1 (12.5%)
Threat info
Last 5

SNS

(Total : 16)
  Total keyword

attack Exploit Attacker Email Victim Google Malware Telegram Stealer Trojan ChatGPT North Korea Vawtrak Password hijack GameoverP2P Report Zero Trust United States target Operation Government DarkWeb CISA Proofpoint

No Title Date
1Proofpoint @proofpoint
Each year on April 28th, #NationalSuperheroDay honors superheroes, both real and fictional. To celebrate, we asked our employees, "If Proofpoint were a superhero, what would its powers be?" We think their answers are Marvel-ous! ????‍♂️ As the leader in #HumanCentricSecurity, we are https://t.co/Y
2025.04.28
2Kaspersky @kaspersky
Behind the attacks: breaking down real incident tactics & key detections in 2024 From exploited gaps to the most triggered detection rules, we’re unpacking how attackers operated in 2024—and what your defenses need to stop them. Swipe through ⬇️ #Cybersecurity https://t.co/HAAGQLcmVa
2025.04.28
3The Hacker News @TheHackersNews
???? Fake jobs, real danger. North Korean hackers are posing as crypto firms to lure devs into malware traps. ????3 fronts: BlockNovas, Angeloper, SoftGlide ????3 Malware: BeaverTail, InvisibleFerret, OtterCookie ????3 Target: Your wallet, data & trust. Read: https://t.co/oDrtXbH2aS
2025.04.25
4Kaspersky @kaspersky
Behind the attacks: breaking down real incident tactics & key detections in 2024 From exploited gaps to the most triggered detection rules, we’re unpacking how attackers operated in 2024—and what your defenses need to stop them. Swipe through ⬇️ #Cybersecurity https://t.co/YC1vsBvlab
2025.04.23
5The Hacker News @TheHackersNews
???? Signed by Google. Hosted by Google. Hijacked by Hackers. ???? Hackers sent real emails from no-reply@google.com — fully verified, signed, no warnings. Victims handed over passwords, believing it was legit. ✔️ Real Google email ✔️ Fake login on Google Sites ✔️ Passed DKIM, SPF, https://t.co/VA
2025.04.22

Additional information

Beta Service, If you select keyword, you can check detailed information.