Summary: 2025/04/28 21:31
First reported date: 2010/05/28
Inquiry period : 2025/04/21 21:31 ~ 2025/04/28 21:31 (7 days), 21 search results
전 기간대비 -124% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 RCE Alert attack CVSS PoC 입니다.
악성코드 유형 NetWireRC DslogdRAT 도 새롭게 확인됩니다.
기관 및 기업 Commvault Japan NSA Qualys 도 새롭게 확인됩니다.
기타 ZeroDay IoT Allows Command Center 등 신규 키워드도 확인됩니다.
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk
ㆍ 2025/04/25 DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
ㆍ 2025/04/25 Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028)
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Vulnerability | 21 | ▼ -25 (-119%) |
2 | CVE | 21 | ▼ -26 (-124%) |
3 | RCE | 11 | ▲ 2 (18%) |
4 | Exploit | 8 | ▼ -2 (-25%) |
5 | Alert | 7 | ▲ 3 (43%) |
6 | Malware | 6 | ▼ -8 (-133%) |
7 | attack | 5 | ▲ 2 (40%) |
8 | Update | 5 | ▼ -3 (-60%) |
9 | CVSS | 5 | ▲ 1 (20%) |
10 | Report | 4 | ▼ -5 (-125%) |
11 | ZeroDay | 3 | ▲ new |
12 | PoC | 3 | ▲ 1 (33%) |
13 | Software | 2 | ▼ -4 (-200%) |
14 | Supply chain | 2 | ▲ 1 (50%) |
15 | Operation | 2 | ▼ -3 (-150%) |
16 | IoT | 2 | ▲ new |
17 | Allows | 2 | ▲ new |
18 | program | 2 | ▼ -9 (-450%) |
19 | Commvault | 2 | ▲ new |
20 | remote | 2 | - 0 (0%) |
21 | Command | 2 | ▲ new |
22 | Center | 2 | ▲ new |
23 | SAP | 2 | ▲ new |
24 | ErlangOTP | 2 | ▲ new |
25 | target | 2 | ▲ 1 (50%) |
26 | CVEs | 2 | ▲ new |
27 | GitHub | 2 | - 0 (0%) |
28 | DDoS | 2 | ▲ 1 (50%) |
29 | NetWeaver | 1 | ▲ new |
30 | path | 1 | ▲ new |
31 | Infodraw | 1 | ▲ new |
32 | sensitive | 1 | ▲ new |
33 | Null | 1 | ▲ new |
34 | SSLVPN | 1 | ▲ new |
35 | NetWireRC | 1 | ▲ new |
36 | Japan | 1 | ▲ new |
37 | DslogdRAT | 1 | ▲ new |
38 | Riva | 1 | ▲ new |
39 | Ivanti | 1 | ▲ new |
40 | ICS | 1 | ▲ new |
41 | ruby | 1 | ▲ new |
42 | databreach | 1 | ▲ new |
43 | RackStatic | 1 | ▲ new |
44 | access | 1 | ▲ new |
45 | Disclosure | 1 | - 0 (0%) |
46 | tamper | 1 | ▲ new |
47 | CMS | 1 | ▲ new |
48 | v3 | 1 | ▲ new |
49 | score | 1 | ▲ new |
50 | mode | 1 | ▲ new |
51 | Vulnerabilities | 1 | ▲ new |
52 | React | 1 | ▲ new |
53 | NVIDIA | 1 | ▲ new |
54 | SonicOS | 1 | ▲ new |
55 | NSA | 1 | ▲ new |
56 | Q1 | 1 | ▲ new |
57 | Ubuntu | 1 | ▲ new |
58 | SSH | 1 | ▲ new |
59 | Maximum | 1 | ▲ new |
60 | Cisco | 1 | ▼ -1 (-100%) |
61 | 1 | ▲ new | |
62 | FortiGuard | 1 | ▲ new |
63 | available | 1 | ▲ new |
64 | critical | 1 | ▼ -3 (-300%) |
65 | Active | 1 | - 0 (0%) |
66 | 1 | ▲ new | |
67 | ReversingLabs | 1 | ▲ new |
68 | Changes | 1 | ▲ new |
69 | call | 1 | ▲ new |
70 | Linux | 1 | - 0 (0%) |
71 | DNS | 1 | ▲ new |
72 | Exploited | 1 | ▲ new |
73 | Docker | 1 | ▲ new |
74 | user | 1 | ▲ new |
75 | HardenRunner | 1 | ▲ new |
76 | code | 1 | - 0 (0%) |
77 | execution | 1 | - 0 (0%) |
78 | DYEPACK | 1 | - 0 (0%) |
79 | Qualys | 1 | ▲ new |
80 | Education | 1 | - 0 (0%) |
81 | CISA | 1 | ▼ -18 (-1800%) |
82 | Government | 1 | ▼ -7 (-700%) |
83 | intelligence | 1 | ▼ -4 (-400%) |
84 | NIST | 1 | - 0 (0%) |
85 | Redis | 1 | ▲ new |
86 | Exposes | 1 | ▲ new |
87 | Leave | 1 | ▲ new |
Special keyword group
Top 5
Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|
Threat info
Last 5SNS
(Total : 12)Vulnerability CVE RCE Attacker CVSS DDoS PoC ZeroDay Report attack Exploit
News
(Total : 9)CVE Vulnerability Exploit RCE Malware Update attack Report Attacker CVSS CVEs Commvault IoT Supply chain Operation GitHub Software target NetWireRC ZeroDay Japan DslogdRAT PoC DYEPACK NIST Ubuntu Cisco WhatsApp Linux DNS intelligence Docker Qualys Education NSA CISA Government
No | Title | Date |
---|---|---|
1 | NVIDIA Riva Vulnerabilities Leave AI-Powered Speech and Translation Services at Risk - TrendMicro | 2025.04.28 |
2 | DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks - The Hacker News | 2025.04.25 |
3 | Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) - FortiGuard Labs | 2025.04.25 |
4 | CVE-2025-34028: PoC Released for Critical RCE Vulnerability in Commvault Command Center - Malware.News | 2025.04.25 |
5 | 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure - The Hacker News | 2025.04.24 |
Additional information
No | Title | Date |
---|---|---|
1 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
2 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
3 | IR Trends Q1 2025: Phishing soars as identity-based attacks persist - Malware.News | 2025.04.28 |
4 | Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries - Malware.News | 2025.04.28 |
5 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Commvault Command Center Path Traversal Vulnerability (CVE-2025-34028) - FortiGuard Labs | 2025.04.25 |
2 | CVE-2025-34028: PoC Released for Critical RCE Vulnerability in Commvault Command Center - Malware.News | 2025.04.25 |
3 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
4 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
5 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CVE MS-MSDT AntiDebug AntiVM PNG Format MSOffice File JPEG Format | f6febdcc05cc9e04e4119c83e1afa2c8 | 30083 | 2022.08.02 |
2 | ![]() Formbook CVE MS-MSDT Word 2007 file format(docx) | 730768c4f029608adf0032e95e8e8a1d | 29851 | 2022.07.26 |
3 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | cdd33ffa502cbffec6e64c4574846a89 | 29852 | 2022.07.26 |
4 | ![]() CVE MS-MSDT AntiDebug AntiVM MSOffice File | 465585177a642d88295d7f0a55b8984c | 29868 | 2022.07.26 |
5 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | e7bde7d2b74218b4faf98d5f45b86593 | 29669 | 2022.07.20 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 29 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |