EQST Trend Report
주요 리포트
2026
03
1/ 5

EQST Security Expert Group
EQST is a group of top-notch security professionals proven in cyber threat analysis and research.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
It focuses on infringement threat research activities along with business performance such as response to infringement incidents, strategic hacking, vulnerability diagnosis, and threat intelligence.
AI, IoT, Cloud new technology research
Publishing latest hacking technique analysis report
A number of hacking defense competition
EQST Report list
202602[Headline]Analysis of the Seven Core Principles for AI in the Financial Sector and Policy Cases in the Republic of Korea and Abroad
[Ransomware]The Incessant Rebranding of Global Ransomware Strains
[Research&Technique]n8n Arbitrary File Read Vulnerability (CVE-2026-21858)
202601[Headline]A Strategy for Proactive Security and Building a Red Team–Driven Cyber Immunity Framework
[Keep up with Ransomware]Sinobi Ransomware: Analysis of Lynx Group Ties
[Research & Technique]Authentication Risks from JWT Signing Key Exposure and Mitigation Strategies
202508[Special Report]Zero Trust Security Strategy: System
[Keep up with Ransomware]Gunra Ransomware Targeting the Korea Financial Sector
[Headline]Shadow AI : Detection, Control, and Governance for Manufacturing Confidentiality
202507[Special Report]Zero Trust Security Strategy: Network
[Keep up with Ransomware]DireWolf Ransomware Establishing Negotiation Channels for Each Victim
[Headline]Strategies for Achieving Security Visibility and Addressing Gray Zone Vulnerabilities
202506[Special Report]EQST insight June Special Report
[Keep up with Ransomware]EQST insight June Keep up with Ransomware
[Headline]EQST insight June Headline
202505[Special Report]Zero Trust Security Strategy: Identifiers and Identity Management
[Keep up with Ransomware]DragonForce Ransomware Introduces the Cartel Model
[Headline]Transition and Implications of National Network Security Policy through the Introduction of N²SF
202504[Research & Technique]Bypass Vulnerability in Next.js Middleware (CVE-2025-29927)
[Keep up with Ransomware]The Rapidly Evolving Vanhelsing Ransomware
[Headline]Increase in Cyber Attacks Targeting Medical Institutions and Security Response Strategies
202503[Research & Technique][Keep up with Ransomware]LockBit's Recent Movements
[Headline]Zero Trust, A New Paradigm of Security
202502[Research & Technique]XWiki RCE Vulnerability (CVE-2024-55879)
[Keep up with Ransomware]The Looming Threat of Funksec: Beyond RaaS to data auction
[Headline]Network separation regulatory improvement plan for the financial sector
202501[Research & Technique]Struts2 File Upload Vulnerability (CVE-2024-53677)
[Keep up with Ransomware]Underground ransomware targeting Korean manufacturers already twice this year
[Headline]Security threats and response plans to address the advancement of quantum computing technology