Summary: 2025/04/29 00:38
First reported date: 2017/09/19
Inquiry period : 2025/04/22 00:38 ~ 2025/04/29 00:38 (7 days), 17 search results
전 기간대비 24% 높은 트렌드를 보이고 있습니다.
전 기간대비 상승한 Top5 연관 키워드는 Supply chain Software Malware attack Report 입니다.
악성코드 유형 Ransomware RansomHouse Trojan GameoverP2P DYEPACK 도 새롭게 확인됩니다.
공격자 Lazarus 도 새롭게 확인됩니다.
공격기술 APT 도 새롭게 확인됩니다.
기관 및 기업 Europe Google Palo Alto Networks Kaspersky Australia South Korea Qualys 도 새롭게 확인됩니다.
기타 Update securityaffairs Cryptocurrency Firmware Secure 등 신규 키워드도 확인됩니다.
* 최근 뉴스기사 Top3:
ㆍ 2025/04/28 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types
ㆍ 2025/04/26 How SBOMs power secure software acquisition | Sonatype Blog
ㆍ 2025/04/26 What is the xBOM?
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | Supply chain | 17 | ▲ 4 (24%) |
2 | Software | 11 | ▲ 6 (55%) |
3 | Malware | 10 | ▲ 4 (40%) |
4 | attack | 10 | ▲ 6 (60%) |
5 | Report | 6 | ▲ 5 (83%) |
6 | intelligence | 6 | ▲ 4 (67%) |
7 | RCE | 6 | ▲ 3 (50%) |
8 | Operation | 6 | ▲ 4 (67%) |
9 | AI | 5 | ▲ 4 (80%) |
10 | Vulnerability | 5 | ▲ 3 (60%) |
11 | Exploit | 5 | ▲ 2 (40%) |
12 | target | 4 | ▲ 2 (50%) |
13 | Update | 4 | ▲ new |
14 | Ransomware | 3 | ▲ new |
15 | GitHub | 3 | ▲ 2 (67%) |
16 | NIST | 3 | ▲ 1 (33%) |
17 | Government | 3 | ▲ 2 (67%) |
18 | CISA | 3 | ▲ 2 (67%) |
19 | securityaffairs | 2 | ▲ new |
20 | hacking | 2 | ▲ 1 (50%) |
21 | ML | 2 | ▲ 1 (50%) |
22 | Education | 2 | - 0 (0%) |
23 | Cryptocurrency | 2 | ▲ new |
24 | Firmware | 2 | ▲ new |
25 | supply | 2 | ▼ -2 (-100%) |
26 | United States | 2 | ▲ 1 (50%) |
27 | Secure | 2 | ▲ new |
28 | Campaign | 2 | - 0 (0%) |
29 | Backdoor | 2 | ▼ -1 (-50%) |
30 | Ripple | 2 | ▲ new |
31 | CVE | 2 | ▲ 1 (50%) |
32 | xBOM | 2 | ▲ new |
33 | library | 2 | ▲ new |
34 | xrpljs | 2 | ▲ new |
35 | Java | 2 | ▲ new |
36 | Bill | 2 | ▲ new |
37 | Materials | 2 | ▲ new |
38 | APT | 1 | ▲ new |
39 | Europe | 1 | ▲ new |
40 | 1 | ▲ new | |
41 | DBIR | 1 | ▲ new |
42 | thirdparty | 1 | - 0 (0%) |
43 | Blister | 1 | ▲ new |
44 | Verizon | 1 | ▲ new |
45 | critical | 1 | ▲ new |
46 | risk | 1 | ▲ new |
47 | VPN | 1 | ▲ new |
48 | Palo Alto Networks | 1 | ▲ new |
49 | Kaspersky | 1 | ▲ new |
50 | IoT | 1 | ▲ new |
51 | Australia | 1 | ▲ new |
52 | EDR | 1 | ▲ new |
53 | SBOMs | 1 | ▲ new |
54 | XDR | 1 | ▲ new |
55 | SolarWinds | 1 | ▲ new |
56 | Takedown | 1 | - 0 (0%) |
57 | machine | 1 | ▲ new |
58 | South Korea | 1 | ▲ new |
59 | SBOM | 1 | ▲ new |
60 | South | 1 | ▲ new |
61 | Byrd | 1 | ▲ new |
62 | acquisition | 1 | ▲ new |
63 | XSIAM | 1 | ▲ new |
64 | SyncHole | 1 | ▲ new |
65 | Lazarus | 1 | ▲ new |
66 | power | 1 | ▲ new |
67 | XRP | 1 | ▲ new |
68 | CVEs | 1 | ▲ new |
69 | model | 1 | ▲ new |
70 | npm | 1 | - 0 (0%) |
71 | JavaScript | 1 | ▲ new |
72 | RansomHouse | 1 | ▲ new |
73 | Alert | 1 | ▲ new |
74 | Bacton | 1 | ▲ new |
75 | Logistics | 1 | ▲ new |
76 | Victim | 1 | ▲ new |
77 | CVSS | 1 | - 0 (0%) |
78 | Linux | 1 | - 0 (0%) |
79 | Ubuntu | 1 | ▲ new |
80 | DNS | 1 | ▲ new |
81 | Docker | 1 | ▲ new |
82 | user | 1 | ▲ new |
83 | HardenRunner | 1 | ▲ new |
84 | js | 1 | ▲ new |
85 | Package | 1 | ▲ new |
86 | MLBOM | 1 | ▲ new |
87 | Eclypsium | 1 | ▲ new |
88 | Trojan | 1 | ▲ new |
89 | GameoverP2P | 1 | ▲ new |
90 | ChatGPT | 1 | ▲ new |
91 | Your | 1 | ▲ new |
92 | ReversingLabs | 1 | ▲ new |
93 | chain | 1 | ▼ -2 (-200%) |
94 | 1 | ▲ new | |
95 | Steal | 1 | ▲ new |
96 | program | 1 | - 0 (0%) |
97 | Ripples | 1 | ▲ new |
98 | NSA | 1 | - 0 (0%) |
99 | Qualys | 1 | ▲ new |
100 | DYEPACK | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Ransomware |
|
3 (42.9%) |
RansomHouse |
|
1 (14.3%) |
Trojan |
|
1 (14.3%) |
GameoverP2P |
|
1 (14.3%) |
DYEPACK |
|
1 (14.3%) |

Attacker & Actors
The status of the attacker or attack group being issued.
Keyword | Average | Label |
---|---|---|
Lazarus |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Government |
|
3 (18.8%) |
CISA |
|
3 (18.8%) |
United States |
|
2 (12.5%) |
Europe |
|
1 (6.3%) |
|
1 (6.3%) |
Threat info
Last 5SNS
(Total : 5)Supply chain hacking Campaign South Korea Malware Lazarus Operation APT Cryptocurrency Victim RansomHouse Ransomware attack Java Kaspersky
News
(Total : 12)Supply chain Software Malware attack RCE intelligence Report Operation Vulnerability Exploit Update Attacker target GitHub NIST Government CISA United States Education Ransomware Firmware Backdoor CVE Palo Alto Networks DNS Australia EDR XDR SolarWinds Ubuntu Linux CVSS Takedown Europe IoT Blister Google DYEPACK Qualys NSA Java Cryptocurrency CVEs Email ChatGPT Campaign GameoverP2P Trojan Docker VPN
No | Title | Date |
---|---|---|
1 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
2 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
3 | What is the xBOM? - Malware.News | 2025.04.26 |
4 | What is the xBOM? - ReversingLabs Blog | 2025.04.26 |
5 | Secure Your AI Supply Chain with the New ML-BOM - Malware.News | 2025.04.25 |
Additional information
No | Title | Date |
---|---|---|
1 | Employee monitoring app exposes users, leaks 21+ million screenshots - Malware.News | 2025.04.28 |
2 | Introducing XSIAM 3.0 - Malware.News | 2025.04.28 |
3 | Deploy Bravely with Prisma AIRS - Malware.News | 2025.04.28 |
4 | 2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types - Malware.News | 2025.04.28 |
5 | Intel CEO Targets Change in Corporate Culture to Shape Up - Bloomberg Technology | 2025.04.28 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | How SBOMs power secure software acquisition | Sonatype Blog - Malware.News | 2025.04.26 |
2 | Bruce Byrd on Public-Private Partnerships in Cybersecurity - Malware.News | 2025.04.25 |
3 | Verizon 2025 DBIR: Third-party software risk takes the spotlight - Malware.News | 2025.04.25 |
4 | Verizon 2025 DBIR: Third-party software risk takes the spotlight - Malware.News | 2025.04.25 |
5 | Changes to CVE program are a call to action on your AppSec strategy - Malware.News | 2025.04.23 |
View only the last 5 |