Summary: 2025/04/28 20:15
First reported date: 2014/09/25
Inquiry period : 2025/04/21 20:15 ~ 2025/04/28 20:15 (7 days), 20 search results
전 기간대비 -145% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 attack Advertising Secure Supply chain Google 입니다.
악성코드 유형 CACTUS MgBot 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
기관 및 기업 France Splunk 도 새롭게 확인됩니다.
기타 March ZeroDay IoC Password PebbleDash 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/26 Threat Hunting: For what, when, and how?
ㆍ 2025/04/26 How SBOMs power secure software acquisition | Sonatype Blog
ㆍ 2025/04/25 Lessons from Ted Lasso for cybersecurity success
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | CISA | 20 | ▼ -29 (-145%) |
2 | Malware | 15 | ▼ -7 (-47%) |
3 | RCE | 9 | ▼ -3 (-33%) |
4 | attack | 7 | ▲ 3 (43%) |
5 | intelligence | 7 | ▼ -4 (-57%) |
6 | Report | 6 | ▼ -9 (-150%) |
7 | Exploit | 6 | ▼ -7 (-117%) |
8 | Microsoft | 5 | ▼ -2 (-40%) |
9 | Software | 5 | ▼ -2 (-40%) |
10 | United States | 5 | ▼ -7 (-140%) |
11 | target | 5 | ▼ -1 (-20%) |
12 | Update | 5 | ▼ -5 (-100%) |
13 | Advertising | 5 | ▲ 3 (60%) |
14 | Operation | 4 | ▼ -3 (-75%) |
15 | Vulnerability | 4 | ▼ -27 (-675%) |
16 | Government | 4 | ▼ -8 (-200%) |
17 | Secure | 3 | ▲ 2 (67%) |
18 | GitHub | 3 | ▼ -1 (-33%) |
19 | Supply chain | 3 | ▲ 2 (67%) |
20 | 3 | ▲ 2 (67%) | |
21 | Backdoor | 3 | ▲ 2 (67%) |
22 | Distribution | 3 | ▲ 2 (67%) |
23 | VirusTotal | 2 | - 0 (0%) |
24 | NetWireRC | 2 | ▲ 1 (50%) |
25 | Campaign | 2 | ▼ -4 (-200%) |
26 | March | 2 | ▲ new |
27 | China | 2 | ▼ -2 (-100%) |
28 | ZeroDay | 2 | ▲ new |
29 | IoC | 2 | ▲ new |
30 | Password | 2 | ▲ new |
31 | 2 | - 0 (0%) | |
32 | NSA | 2 | ▲ 1 (50%) |
33 | Lazarus | 2 | ▲ new |
34 | progress | 2 | ▲ 1 (50%) |
35 | Education | 2 | - 0 (0%) |
36 | PebbleDash | 2 | ▲ new |
37 | auf | 2 | ▲ new |
38 | Talos | 1 | ▲ new |
39 | thirdparty | 1 | ▲ new |
40 | DBIR | 1 | ▲ new |
41 | VPN | 1 | ▼ -2 (-200%) |
42 | Gottumukkala | 1 | ▲ new |
43 | query | 1 | ▲ new |
44 | Madhu | 1 | ▲ new |
45 | No | 1 | ▲ new |
46 | Schneider | 1 | ▲ new |
47 | La | 1 | ▲ new |
48 | Siemens | 1 | ▲ new |
49 | activity | 1 | ▲ new |
50 | politicizzazione | 1 | ▲ new |
51 | Critical | 1 | ▼ -1 (-100%) |
52 | advisory | 1 | ▲ new |
53 | della | 1 | ▲ new |
54 | lta | 1 | ▲ new |
55 | NextgovFCW | 1 | ▲ new |
56 | href | 1 | ▼ -2 (-200%) |
57 | hacking | 1 | ▼ -7 (-700%) |
58 | SentinelOne | 1 | ▼ -5 (-500%) |
59 | detection | 1 | ▲ new |
60 | threat | 1 | ▼ -1 (-100%) |
61 | Verizon | 1 | ▲ new |
62 | power | 1 | ▲ new |
63 | IoT | 1 | ▲ new |
64 | Lasso | 1 | ▲ new |
65 | Spain | 1 | - 0 (0%) |
66 | Trojan | 1 | - 0 (0%) |
67 | Apple | 1 | - 0 (0%) |
68 | Linux | 1 | - 0 (0%) |
69 | Cisco | 1 | ▼ -1 (-100%) |
70 | Volt Typhoon | 1 | - 0 (0%) |
71 | sec | 1 | ▲ new |
72 | SBOMs | 1 | ▲ new |
73 | France | 1 | ▲ new |
74 | Ted | 1 | ▲ new |
75 | United Kingdom | 1 | ▼ -1 (-100%) |
76 | CACTUS | 1 | ▲ new |
77 | Victim | 1 | ▼ -1 (-100%) |
78 | acquisition | 1 | ▲ new |
79 | RSA Conference | 1 | - 0 (0%) |
80 | ChatGPT | 1 | - 0 (0%) |
81 | Splunk | 1 | ▲ new |
82 | DDoS | 1 | - 0 (0%) |
83 | risk | 1 | ▲ new |
84 | hunt | 1 | ▲ new |
85 | MgBot | 1 | ▲ new |
86 | AV25 | 1 | ▲ new |
87 | Proxy | 1 | ▲ new |
88 | Attacken | 1 | ▲ new |
89 | Kaspersky | 1 | ▼ -1 (-100%) |
90 | Issues | 1 | ▲ new |
91 | Censys | 1 | ▲ new |
92 | Design | 1 | ▲ new |
93 | top | 1 | ▲ new |
94 | Multiple | 1 | ▲ new |
95 | Wildbahn | 1 | ▲ new |
96 | NTLMAuthentifizierung | 1 | ▲ new |
97 | Microsofts | 1 | ▲ new |
98 | Red Team | 1 | ▲ new |
99 | Police | 1 | ▲ new |
100 | DNS | 1 | - 0 (0%) |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
2 (66.7%) |
Volt Typhoon |
|
1 (33.3%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
CISA |
|
20 (39.2%) |
Microsoft |
|
5 (9.8%) |
United States |
|
5 (9.8%) |
Government |
|
4 (7.8%) |
|
3 (5.9%) |
Threat info
Last 5SNS
(Total : 1)News
(Total : 19)CISA Malware RCE attack intelligence Exploit Report Update Advertising Microsoft target Software Vulnerability Attacker Government Operation United States Supply chain GitHub Distribution Google Backdoor IoC Campaign Email Lazarus NSA VirusTotal ZeroDay Password Education China NetWireRC VPN Volt Typhoon hacking MgBot SentinelOne Victim Splunk ChatGPT IoT Spain Trojan Apple Linux Cisco France United Kingdom CACTUS RSA Conference DDoS C2 Red Team Russia DNS LinkedIn Windows MFA ...
No | Title | Date |
---|---|---|
1 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
2 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
3 | CISA gets new No. 2: Madhu Gottumukkala - CyberScoop | 2025.04.25 |
4 | Lessons from Ted Lasso for cybersecurity success - Malware.News | 2025.04.25 |
5 | Verizon 2025 DBIR: Third-party software risk takes the spotlight - Malware.News | 2025.04.25 |
Additional information
No | Title | Date |
---|---|---|
1 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
2 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
3 | Navigating Through The Fog - Malware.News | 2025.04.28 |
4 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
5 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
2 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
3 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
4 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
5 | CISA gets new No. 2: Madhu Gottumukkala - CyberScoop | 2025.04.25 |
View only the last 5 |