EQST Trend Report
주요 리포트
2026
02
1/ 5

EQST Security Expert Group
EQST is a group of top-notch security professionals proven in cyber threat analysis and research.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
AI, IoT, Cloud new technology research
Publishing latest hacking technique analysis report
A number of hacking defense competition
EQST Report list
202602[Headline]Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad
[Keep up with Ransomware]The Incessant Rebranding of Global Ransomware Strains
[Research&Technique]n8n Arbitrary File Read Vulnerability (CVE-2026-21858)
202601[Headline]A Strategy for Proactive Security and Building a Red Team–Driven Cyber Immunity Framework
[Keep up with Ransomware]Sinobi Ransomware: Analysis of Lynx Group Ties
[Research & Technique]Authentication Risks from JWT Signing Key Exposure and Mitigation Strategies
202508[Headline]Shadow AI : Detection, Control, and Governance for Manufacturing Confidentiality
[Keep up with Ransomware]Gunra Ransomware Targeting the Korea Financial Sector
[Special Report]Zero Trust Security Strategy: System
202507[Headline]Strategies for Achieving Security Visibility and Addressing Gray Zone Vulnerabilities
[Keep up with Ransomware]DireWolf Ransomware Establishing Negotiation Channels for Each Victim
[Special Report]Zero Trust Security Strategy: Network
202506[Headline]Rule Framework: A Core Tool for Threat-Centric Security Strategy
[Keep up with Ransomware]Devman: A Single Group Using Assorted Ransomware
[Special Report]Zero Trust Security Strategy: Devices and Endpoints
202505[Headline]Transition and Implications of National Network Security Policy through the Introduction of N²SF
[Keep up with Ransomware]DragonForce Ransomware Introduces the Cartel Model
[Special Report]Zero Trust Security Strategy: Identifiers and Identity Management
202504[Headline]Increase in Cyber Attacks Targeting Medical Institutions and Security Response Strategies
[Keep up with Ransomware]The Rapidly Evolving Vanhelsing Ransomware
[Research & Technique]Bypass Vulnerability in Next.js Middleware (CVE-2025-29927)
202503[Headline]Zero Trust, A New Paradigm of Security
[Keep up with Ransomware]LockBit's Recent Movements
[Research & Technique]JSONPath-Plus RCE Vulnerability(CVE-2025-1302)
202502[Headline]Network separation regulatory improvement plan for the financial sector
[Keep up with Ransomware]The Looming Threat of Funksec: Beyond RaaS to data auction
[Research & Technique]XWiki RCE Vulnerability (CVE-2024-55879)
202501[Headline]Security threats and response plans to address the advancement of quantum computing technology
[Keep up with Ransomware]Underground ransomware targeting Korean manufacturers already twice this year
[Research & Technique]Struts2 File Upload Vulnerability (CVE-2024-53677)