SK shieldus Logo
SK shieldus

EQST Trend Reports

EQST Trend Report

주요 리포트

n8n Arbitrary File Read Vulnerability (CVE-2026-21858)
2026
03

EQST insight Feb Research&Technique

n8n Arbitrary File Read Vulnerability (CVE-2026-21858)

EQST insight Feb Headline

Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad

EQST insight Feb Ransomware

The Incessant Rebranding of Global Ransomware Strains

Special Report

2025 4Q KARA Ransomware Trend Report

View Details

EQST insight Jan Research & Technique

Authentication Risks from JWT Signing Key Exposure and Mitigation Strategies

View Details
1/ 5
EQST Security Expert Group
EQST is a group of top-notch security professionals proven in cyber threat analysis and research.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
AI, IoT, Cloud new technology research

AI, IoT, Cloud new technology research

Publishing latest hacking technique analysis report

Publishing latest hacking technique analysis report

A number of hacking defense competition

A number of hacking defense competition

EQST Report list

  • https://assets.ctfassets.net/6hqdqj4fjyeg/4z5YuFotTfpHfe7hcnLoL1/eeefefd2ec7cd8c7ccb8dbcf9c57f298/SK_shieldus_EQST_insight_FEB.pdf
    2026
    02
    [Headline]

    Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad

    [Ransomware]

    The Incessant Rebranding of Global Ransomware Strains

    [Research&Technique]

    n8n Arbitrary File Read Vulnerability (CVE-2026-21858)

  • https://downloads.ctfassets.net/6hqdqj4fjyeg/5SeBQHmycttazdPtWqdmbA/f995a9a186b9a11c173f2f563635b805/SK_shieldus_EQST_insight_Jan.pdf
    2026
    01
    [Headline]

    A Strategy for Proactive Security and Building a Red Team–Driven Cyber Immunity Framework

    [Keep up with Ransomware]

    Sinobi Ransomware: Analysis of Lynx Group Ties

    [Research & Technique]

    Authentication Risks from JWT Signing Key Exposure and Mitigation Strategies

  • https://assets.ctfassets.net/6hqdqj4fjyeg/983J937Srj6tZsZ6IVb3K/2665a50496864258dd232f429e454af0/sk-shieldus-eqst-insight-august-2025-issue.pdf
    2025
    08
    [Special Report]

    Zero Trust Security Strategy: System

    [Keep up with Ransomware]

    Gunra Ransomware Targeting the Korea Financial Sector

    [Headline]

    Shadow AI : Detection, Control, and Governance for Manufacturing Confidentiality

  • https://assets.ctfassets.net/6hqdqj4fjyeg/6TtYyrr0cBwhplylyT7lX1/6057c1de6dcb9d5150ebb7d98cf3860a/sk-shieldus-eqst-insight-july-2025-issue.pdf
    2025
    07
    [Special Report]

    Zero Trust Security Strategy: Network

    [Keep up with Ransomware]

    DireWolf Ransomware Establishing Negotiation Channels for Each Victim

    [Headline]

    Strategies for Achieving Security Visibility and Addressing Gray Zone Vulnerabilities

  • https://assets.ctfassets.net/6hqdqj4fjyeg/1QX2DQqS9y27YwZmTFW5II/d844a25099eabd16678ac884da27fc19/sk-shieldus-eqst-insight-june-2025-issue.pdf
    2025
    06
    [Special Report]

    EQST insight June Special Report

    [Keep up with Ransomware]

    EQST insight June Keep up with Ransomware

    [Headline]

    EQST insight June Headline

  • https://assets.ctfassets.net/6hqdqj4fjyeg/72geQsldvPuYesKJiZxe7r/0dac6c11fa5ba17212e837a75d86f2b9/sk-shieldus-eqst-insight-may-2025-issue.pdf
    2025
    05
    [Special Report]

    Zero Trust Security Strategy: Identifiers and Identity Management

    [Keep up with Ransomware]

    DragonForce Ransomware Introduces the Cartel Model

    [Headline]

    Transition and Implications of National Network Security Policy through the Introduction of N²SF

  • https://assets.ctfassets.net/6hqdqj4fjyeg/17GSt4FlAMdqVTP08LxvrT/a02c82047871c8af851af5e1db9e72e4/sk-shieldus-eqst-insight-april-2025-issue.pdf
    2025
    04
    [Research & Technique]

    Bypass Vulnerability in Next.js Middleware (CVE-2025-29927)

    [Keep up with Ransomware]

    The Rapidly Evolving Vanhelsing Ransomware

    [Headline]

    Increase in Cyber Attacks Targeting Medical Institutions and Security Response Strategies

  • https://assets.ctfassets.net/6hqdqj4fjyeg/4yQbpkspilpcAlv1GODmoy/34f4a0b8e56586d3432d94460f89c114/sk-shieldus-eqst-insight-mar-2025-issue.pdf
    2025
    03
    [Research & Technique]

    [Keep up with Ransomware]

    LockBit's Recent Movements

    [Headline]

    Zero Trust, A New Paradigm of Security

  • https://assets.ctfassets.net/6hqdqj4fjyeg/gOC74fTnSLpzOiYbFtN8l/17adffd70346b8e09e0e82b76bbaa054/sk-shieldus-eqst-insight-february-2025-issue.pdf
    2025
    02
    [Research & Technique]

    XWiki RCE Vulnerability (CVE-2024-55879)

    [Keep up with Ransomware]

    The Looming Threat of Funksec: Beyond RaaS to data auction

    [Headline]

    Network separation regulatory improvement plan for the financial sector

  • https://assets.ctfassets.net/6hqdqj4fjyeg/2waZX6pk7gE2NpoIzbMEr5/bc47ca167e250ceaa1b26213bd373c64/sk-shieldus-eqst-insight-january-2025-issue.pdf
    2025
    01
    [Research & Technique]

    Struts2 File Upload Vulnerability (CVE-2024-53677)

    [Keep up with Ransomware]

    Underground ransomware targeting Korean manufacturers already twice this year

    [Headline]

    Security threats and response plans to address the advancement of quantum computing technology