SK Shieldus Logo
SK Shieldus

EQST Trend Reports

EQST Trend Report

주요 리포트

Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad
2026
02

EQST insight Feb Headline

Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad

EQST insight Feb Keep up with Ransomware

The Incessant Rebranding of Global Ransomware Strains

EQST insight Feb Research&Technique

n8n Arbitrary File Read Vulnerability (CVE-2026-21858)

EQST insight Jan Headline

A Strategy for Proactive Security and Building a Red Team–Driven Cyber Immunity Framework

View Details

EQST insight Jan Keep up with Ransomware

Sinobi Ransomware: Analysis of Lynx Group Ties

View Details
1/ 5
EQST Security Expert Group
EQST is a group of top-notch security professionals proven in cyber threat analysis and research.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
AI, IoT, Cloud new technology research

AI, IoT, Cloud new technology research

Publishing latest hacking technique analysis report

Publishing latest hacking technique analysis report

A number of hacking defense competition

A number of hacking defense competition

EQST Report list

  • https://assets.ctfassets.net/6hqdqj4fjyeg/4z5YuFotTfpHfe7hcnLoL1/eeefefd2ec7cd8c7ccb8dbcf9c57f298/SK_shieldus_EQST_insight_FEB.pdf
    2026
    02
    [Headline]

    Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad

    [Keep up with Ransomware]

    The Incessant Rebranding of Global Ransomware Strains

    [Research&Technique]

    n8n Arbitrary File Read Vulnerability (CVE-2026-21858)

  • https://downloads.ctfassets.net/6hqdqj4fjyeg/5SeBQHmycttazdPtWqdmbA/f995a9a186b9a11c173f2f563635b805/SK_shieldus_EQST_insight_Jan.pdf
    2026
    01
    [Headline]

    A Strategy for Proactive Security and Building a Red Team–Driven Cyber Immunity Framework

    [Keep up with Ransomware]

    Sinobi Ransomware: Analysis of Lynx Group Ties

    [Research & Technique]

    Authentication Risks from JWT Signing Key Exposure and Mitigation Strategies

  • https://assets.ctfassets.net/6hqdqj4fjyeg/983J937Srj6tZsZ6IVb3K/2665a50496864258dd232f429e454af0/sk-shieldus-eqst-insight-august-2025-issue.pdf
    2025
    08
    [Headline]

    Shadow AI : Detection, Control, and Governance for Manufacturing Confidentiality

    [Keep up with Ransomware]

    Gunra Ransomware Targeting the Korea Financial Sector

    [Special Report]

    Zero Trust Security Strategy: System

  • https://assets.ctfassets.net/6hqdqj4fjyeg/6TtYyrr0cBwhplylyT7lX1/6057c1de6dcb9d5150ebb7d98cf3860a/sk-shieldus-eqst-insight-july-2025-issue.pdf
    2025
    07
    [Headline]

    Strategies for Achieving Security Visibility and Addressing Gray Zone Vulnerabilities

    [Keep up with Ransomware]

    DireWolf Ransomware Establishing Negotiation Channels for Each Victim

    [Special Report]

    Zero Trust Security Strategy: Network

  • https://assets.ctfassets.net/6hqdqj4fjyeg/1QX2DQqS9y27YwZmTFW5II/d844a25099eabd16678ac884da27fc19/sk-shieldus-eqst-insight-june-2025-issue.pdf
    2025
    06
    [Headline]

    Rule Framework: A Core Tool for Threat-Centric Security Strategy

    [Keep up with Ransomware]

    Devman: A Single Group Using Assorted Ransomware

    [Special Report]

    Zero Trust Security Strategy: Devices and Endpoints

  • https://assets.ctfassets.net/6hqdqj4fjyeg/72geQsldvPuYesKJiZxe7r/0dac6c11fa5ba17212e837a75d86f2b9/sk-shieldus-eqst-insight-may-2025-issue.pdf
    2025
    05
    [Headline]

    Transition and Implications of National Network Security Policy through the Introduction of N²SF

    [Keep up with Ransomware]

    DragonForce Ransomware Introduces the Cartel Model

    [Special Report]

    Zero Trust Security Strategy: Identifiers and Identity Management

  • https://assets.ctfassets.net/6hqdqj4fjyeg/17GSt4FlAMdqVTP08LxvrT/a02c82047871c8af851af5e1db9e72e4/sk-shieldus-eqst-insight-april-2025-issue.pdf
    2025
    04
    [Headline]

    Increase in Cyber Attacks Targeting Medical Institutions and Security Response Strategies

    [Keep up with Ransomware]

    The Rapidly Evolving Vanhelsing Ransomware

    [Research & Technique]

    Bypass Vulnerability in Next.js Middleware (CVE-2025-29927)

  • https://assets.ctfassets.net/6hqdqj4fjyeg/4yQbpkspilpcAlv1GODmoy/34f4a0b8e56586d3432d94460f89c114/sk-shieldus-eqst-insight-mar-2025-issue.pdf
    2025
    03
    [Headline]

    Zero Trust, A New Paradigm of Security

    [Keep up with Ransomware]

    LockBit's Recent Movements

    [Research & Technique]

    JSONPath-Plus RCE Vulnerability(CVE-2025-1302)

  • https://assets.ctfassets.net/6hqdqj4fjyeg/gOC74fTnSLpzOiYbFtN8l/17adffd70346b8e09e0e82b76bbaa054/sk-shieldus-eqst-insight-february-2025-issue.pdf
    2025
    02
    [Headline]

    Network separation regulatory improvement plan for the financial sector

    [Keep up with Ransomware]

    The Looming Threat of Funksec: Beyond RaaS to data auction

    [Research & Technique]

    XWiki RCE Vulnerability (CVE-2024-55879)

  • https://assets.ctfassets.net/6hqdqj4fjyeg/2waZX6pk7gE2NpoIzbMEr5/bc47ca167e250ceaa1b26213bd373c64/sk-shieldus-eqst-insight-january-2025-issue.pdf
    2025
    01
    [Headline]

    Security threats and response plans to address the advancement of quantum computing technology

    [Keep up with Ransomware]

    Underground ransomware targeting Korean manufacturers already twice this year

    [Research & Technique]

    Struts2 File Upload Vulnerability (CVE-2024-53677)