Summary: 2025/04/28 18:34
First reported date: 2012/08/22
Inquiry period : 2025/04/21 18:34 ~ 2025/04/28 18:34 (7 days), 33 search results
전 기간대비 -27% 낮은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Update Windows Exploit Software Operation 입니다.
악성코드 유형 Entropy 도 새롭게 확인됩니다.
기관 및 기업 Oracle CrowdStrike 도 새롭게 확인됩니다.
기타 PoC unter rootkit NvidiaGrafikkartentreiber Sysdig 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/26 Detecting and Mitigating io_uring Abuse for Malware Evasion
ㆍ 2025/04/25 Clandestine rootkit compromise possible with Linux io_uring interface issue
ㆍ 2025/04/25 IT Sicherheitsnews taegliche Zusammenfassung 2025-04-25 12h : 1 posts
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Linux | 33 | ▼ -9 (-27%) |
2 | Update | 15 | ▲ 1 (7%) |
3 | Windows | 12 | ▲ 1 (8%) |
4 | Malware | 12 | ▼ -9 (-75%) |
5 | Exploit | 8 | ▲ 1 (13%) |
6 | Vulnerability | 7 | ▼ -2 (-29%) |
7 | Software | 7 | ▲ 1 (14%) |
8 | RCE | 7 | - 0 (0%) |
9 | attack | 6 | ▼ -6 (-100%) |
10 | Operation | 6 | ▲ 2 (33%) |
11 | target | 5 | ▼ -7 (-140%) |
12 | Advertising | 4 | ▼ -1 (-25%) |
13 | PoC | 4 | ▲ new |
14 | Report | 4 | ▼ -9 (-225%) |
15 | unter | 3 | ▲ new |
16 | rootkit | 3 | ▲ new |
17 | Campaign | 3 | ▼ -8 (-267%) |
18 | Education | 3 | ▲ 2 (67%) |
19 | United States | 3 | ▼ -6 (-200%) |
20 | Microsoft | 3 | ▼ -2 (-67%) |
21 | NvidiaGrafikkartentreiber | 3 | ▲ new |
22 | Phishing | 3 | ▼ -4 (-133%) |
23 | hacking | 3 | - 0 (0%) |
24 | 3 | ▲ 2 (67%) | |
25 | GitHub | 3 | ▼ -2 (-67%) |
26 | Sysdig | 3 | ▲ new |
27 | taegliche | 2 | ▲ 1 (50%) |
28 | Mehrere | 2 | ▼ -1 (-50%) |
29 | Schwachstellen | 2 | ▼ -1 (-50%) |
30 | Kernel | 2 | ▼ -2 (-100%) |
31 | Sicherheitsnews | 2 | ▲ 1 (50%) |
32 | Docker | 2 | ▼ -2 (-100%) |
33 | last | 2 | ▲ 1 (50%) |
34 | Zusammenfassung | 2 | ▲ 1 (50%) |
35 | und | 2 | ▲ new |
36 | IoC | 2 | ▼ -4 (-200%) |
37 | Kubernetes | 2 | ▲ 1 (50%) |
38 | Ransomware | 2 | ▼ -2 (-100%) |
39 | ZeroDay | 2 | ▼ -2 (-100%) |
40 | intelligence | 2 | ▼ -5 (-250%) |
41 | Victim | 2 | ▼ -3 (-150%) |
42 | Sicherheitsupdate | 2 | ▲ new |
43 | China | 2 | ▼ -2 (-100%) |
44 | Backdoor | 2 | ▼ -5 (-250%) |
45 | DDoS | 2 | ▼ -2 (-100%) |
46 | system | 2 | ▲ new |
47 | c&c | 2 | ▼ -3 (-150%) |
48 | powershell | 2 | ▼ -1 (-50%) |
49 | Distribution | 2 | ▼ -3 (-150%) |
50 | hijack | 2 | - 0 (0%) |
51 | Entropy | 1 | ▲ new |
52 | blindspot | 1 | ▲ new |
53 | stealthy | 1 | - 0 (0%) |
54 | Risky | 1 | ▲ new |
55 | 암호 | 1 | ▲ new |
56 | compromise | 1 | ▲ new |
57 | GameoverP2P | 1 | ▼ -2 (-200%) |
58 | Oracle | 1 | ▲ new |
59 | gt | 1 | ▲ new |
60 | interface | 1 | ▲ new |
61 | Firmware | 1 | ▲ new |
62 | Synology | 1 | ▲ new |
63 | pointer | 1 | ▲ new |
64 | world | 1 | ▲ new |
65 | payload | 1 | ▲ new |
66 | cloudnative | 1 | ▲ new |
67 | command | 1 | ▲ new |
68 | Hijacking | 1 | ▼ -1 (-100%) |
69 | 화폐 | 1 | ▲ new |
70 | 가짜 | 1 | ▲ new |
71 | 공격 | 1 | ▼ -1 (-100%) |
72 | EDR | 1 | - 0 (0%) |
73 | NAS | 1 | ▲ new |
74 | France | 1 | - 0 (0%) |
75 | issue | 1 | ▲ new |
76 | iouring | 1 | ▲ new |
77 | Rootkits | 1 | ▲ new |
78 | Blinder | 1 | ▲ new |
79 | Fleck | 1 | ▲ new |
80 | KernelInterface | 1 | ▲ new |
81 | ARMO | 1 | ▲ new |
82 | significant | 1 | ▲ new |
83 | blind | 1 | ▲ new |
84 | CrowdStrike | 1 | ▲ new |
85 | evasion | 1 | ▲ new |
86 | antidetection | 1 | ▲ new |
87 | Access | 1 | ▲ new |
88 | Alleged | 1 | ▲ new |
89 | Server | 1 | ▲ new |
90 | Sale | 1 | ▲ new |
91 | 1 | - 0 (0%) | |
92 | Entwickler | 1 | - 0 (0%) |
93 | das | 1 | - 0 (0%) |
94 | Unsichtbare | 1 | ▲ new |
95 | August | 1 | ▲ new |
96 | Clandestine | 1 | ▲ new |
97 | CISA | 1 | - 0 (0%) |
98 | angreifbar | 1 | ▲ new |
99 | VirusTotal | 1 | - 0 (0%) |
100 | RSA Conference | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
2 (33.3%) |
Entropy |
|
1 (16.7%) |
GameoverP2P |
|
1 (16.7%) |
CACTUS |
|
1 (16.7%) |
Trojan |
|
1 (16.7%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
TraderTraitor |
|
1 (50%) |
CryptoCore |
|
1 (50%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
United States |
|
3 (14.3%) |
Microsoft |
|
3 (14.3%) |
|
3 (14.3%) | |
China |
|
2 (9.5%) |
Oracle |
|
1 (4.8%) |
Threat info
Last 5SNS
(Total : 7)Linux Windows target Ransomware attack PoC China Singapore
News
(Total : 26)Linux Update Malware Windows Exploit Vulnerability Software RCE Operation Attacker attack Report target Advertising Microsoft United States Campaign PoC Education Google hacking Phishing GitHub IoC ZeroDay c&c Docker DDoS Kubernetes Backdoor hijack Victim intelligence powershell Distribution France Oracle IoT GameoverP2P Rootkits EDR Hijacking 북한 TraderTraitor CryptoCore MacOS China Entropy Firmware United Kingdom CrowdStrike CACTUS RSA Conference Cisco VirusTotal Apple NAS CISA Trojan ...
No | Title | Date |
---|---|---|
1 | Linux goes PDF: Wie ein Entwickler das Betriebssystem in ein Dokument verwandelt hat - IT Sicherheitsnews | 2025.04.27 |
2 | Detecting and Mitigating io_uring Abuse for Malware Evasion - Malware.News | 2025.04.26 |
3 | Clandestine rootkit compromise possible with Linux io_uring interface issue - Malware.News | 2025.04.25 |
4 | IT Sicherheitsnews taegliche Zusammenfassung 2025-04-25 12h : 1 posts - IT Sicherheitsnews | 2025.04.25 |
5 | Unsichtbare Rootkits: „Blinder Fleck“ bei Kernel-Interface bedroht Linux-Systeme - IT Sicherheitsnews | 2025.04.25 |
Additional information
No | Title | Date |
---|---|---|
1 | 28th April – Threat Intelligence Report - Malware.News | 2025.04.28 |
2 | Navigating Through The Fog - Malware.News | 2025.04.28 |
3 | Huawei Set to Test Powerful AI Chip to Rival Nvidia’s, WSJ Says - Bloomberg Technology | 2025.04.28 |
4 | Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware - Malware.News | 2025.04.26 |
5 | Threat Hunting: For what, when, and how? - Malware.News | 2025.04.26 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Detecting and Mitigating io_uring Abuse for Malware Evasion - Malware.News | 2025.04.26 |
2 | Detecting and Mitigating io_uring Abuse for Malware Evasion - Malware.News | 2025.04.26 |
3 | Lessons from Ted Lasso for cybersecurity success - Malware.News | 2025.04.25 |
4 | Lessons from Ted Lasso for cybersecurity success - Malware.News | 2025.04.25 |
5 | Lessons from Ted Lasso for cybersecurity success - Malware.News | 2025.04.25 |
View only the last 5 |
No | URL | CC | ASN Co | Reporter | Date |
---|---|---|---|---|---|
1 | http://142.171.103.249:8888/supershell/compile/download/xd elf linux supershell | CA ![]() | Try0 | 2024.08.23 | |
2 | http://160.181.http://160.163:8888/LinuxTF ddos linux | Try0 | 2024.05.08 | ||
3 | http://160.181.http://160.166:8888/LinuxTF ddos linux | Try0 | 2024.05.08 | ||
4 | http://160.181.http://160.165:8888/LinuxTF ddos linux | Try0 | 2024.05.08 | ||
5 | http://160.181.http://160.164:8888/LinuxTF ddos linux | Try0 | 2024.05.08 | ||
View only the last 5 |