EQS Position on AI-Accelerated Vulnerability Discovery and Zero-Day Risk

EQS Trust Center

Start your security review
View & download sensitive information
ControlK

EQS Group is a leading international cloud provider in the fields of corporate compliance, investor relations, and sustainability reporting.

EQS Group’s products are pooled in the cloud-based software EQS COCKPIT. This platform ensures the professional handling of compliance workflows in the fields of whistleblower protection and case management, policy management, business approvals, third-party management, insider list management, disclosure obligations, sustainability reporting including automated ESG data collection, management, and filing in compliance with regulations.

In addition, listed companies benefit from a global newswire, investor targeting and contact management, Investor Relation websites, digital reports, and webcasts for efficient and secure investor communications.

EQS Group was founded in 2000 in Munich, Germany. Today, the group employs around 600 professionals and has offices in the world’s key financial markets.

Find out more at https://www.eqs.com/about-eqs/#about

LEGAL NOTICE

ISO/IEC 27001:2022 Logo
ISO/IEC 27001:2022
ISO/IEC 27017:2015 Logo
ISO/IEC 27017:2015
ISO/IEC 27018:2019 Logo
ISO/IEC 27018:2019
ISO/IEC 27001 SoA Logo
ISO/IEC 27001 SoA
GDPR Logo
GDPR
DORA Logo
DORA
EU AI Act Logo
EU AI Act
NIS 2 Logo
NIS 2
SOC 2 Type 2 Logo
SOC 2 Type 2
TISAX Logo
TISAX
NIST CSF Logo
NIST CSF
EcoVadis 2025 - Silver Logo
EcoVadis 2025 - Silver
ProcessUnity Logo
ProcessUnity
CSA STAR Logo
CSA STAR
EU Cloud COC Logo
EU Cloud COC
CISA: Secure-by-Design Pledge Logo
CISA: Secure-by-Design Pledge
CSA Trusted Cloud Provider Logo
CSA Trusted Cloud Provider
SOC 2 Type 1 Logo
SOC 2 Type 1
ENS RD311/2022 HIGH Logo
ENS RD311/2022 HIGH
CSA STAR Attestation Logo
CSA STAR Attestation
Airbus-company-logoAirbus
AMAG MediaTeam-company-logoAMAG MediaTeam
ARTE Radio-company-logoARTE Radio
Austro Holding-company-logoAustro Holding
Badoo-company-logoBadoo
Banco Bilbao Vizcaya Argentaria-company-logoBanco Bilbao Vizcaya Argentaria
Botify-company-logoBotify
B&B HOTELS GROUP-company-logoB&B HOTELS GROUP
Capgemini-company-logoCapgemini
China Telcom-company-logoChina Telcom
DELFINGEN-company-logoDELFINGEN
Deutsche Bank-company-logoDeutsche Bank
E.On-company-logoE.On
Erste Group-company-logoErste Group
ERT Technologies SAS-company-logoERT Technologies SAS
Eutelsat-company-logoEutelsat
Ferrero-company-logoFerrero
FRANCE 24-company-logoFRANCE 24
GOLDBECK-company-logoGOLDBECK
Groupe IDEA-company-logoGroupe IDEA
Groupe ETAM-company-logoGroupe ETAM
Halfords-company-logoHalfords
HelloFresh-company-logoHelloFresh
HTL Biotechnology-company-logoHTL Biotechnology
Hugo Boss-company-logoHugo Boss
ITA Airways-company-logoITA Airways
KIABI FRANCE-company-logoKIABI FRANCE
La Banque Postale-company-logoLa Banque Postale
Leifheit-company-logoLeifheit
Mangopay.com-company-logoMangopay.com
Meyer Turku-company-logoMeyer Turku
Mercedes-Benz-company-logoMercedes-Benz
OpenAI-company-logoOpenAI
PUMA-company-logoPUMA
Rosenbauer Group-company-logoRosenbauer Group
SAP-company-logoSAP
Sisal-company-logoSisal
Toshiba-company-logoToshiba
UBS-company-logoUBS
Zalando-company-logoZalando

Documents

DOCUMENTSGeneral Bridge Letters
Knowledge Base (FAQ)
  • Secure encryption alghorithms are used as per NIST recommendations
  • Suppliers and subprocessors
  • Policy for personal data protection
  • Commitment to maintain / obtain agreed certification
  • Data will be processed in European Economic Area only
View more
EQS Trust Center Updates

EQS Position on AI-Accelerated Vulnerability Discovery and Zero-Day Risk

Copy link
General

EQS is closely monitoring the evolution of AI-assisted vulnerability discovery and exploit development, including public reporting around Anthropic’s Claude Mythos Preview and related industry initiatives such as Project Glasswing. We do not treat this as a single-vendor or single-model issue. Our position is that “Mythos-class” capabilities are part of a broader shift: vulnerability discovery, exploit validation, patch-diff analysis, and attack automation are becoming faster, more accessible, and more scalable.

This development reinforces EQS’s existing security direction: controls must become faster, more evidence-based, and more integrated into software development, operations, supplier management, and incident response.

Scope of the Threat

EQS uses the term “Mythos-class” as shorthand for a broader class of AI-assisted vulnerability discovery and exploitation workflows. The risk is not dependent on an attacker having direct access to Anthropic’s Claude Mythos Preview or any other specific frontier model.

Material parts of these capabilities are already available today by combining existing AI models with coding agents, security tools, fuzzing, static analysis, exploit frameworks, vulnerability intelligence, patch-diff analysis, and human operator expertise. Well-orchestrated use of existing models can already accelerate vulnerability discovery, exploit validation, and remediation pressure.

For this reason, EQS treats Mythos as a signal of the direction and speed of change, not as the sole source of the threat. Our security response is model-agnostic and focused on reducing exposure, improving detection and remediation speed, strengthening Secure SDLC controls, and limiting blast radius.

CSA Alignment and Industry Collaboration

EQS aligns its approach with relevant industry guidance, including the Cloud Security Alliance publication The “AI Vulnerability Storm”: Building a “Mythos-ready” Security Program. This guidance reflects the same core assumption used by EQS: AI is changing the speed, scale, and economics of vulnerability discovery, and security programs must adapt beyond traditional patching and vulnerability-counting models.

EQS has been actively engaged in Cloud Security Alliance activities and has participated early in the discussion and definition of practical responses to AI-accelerated vulnerability risk. EQS is also listed in the CSA STAR Registry and holds the CSA Trusted Cloud Provider trustmark, reflecting our ongoing commitment to cloud security transparency, assurance, and community contribution.

This external collaboration complements EQS’s internal security work. We use CSA guidance as one input into our ongoing improvements across Secure SDLC, exposure management, third-party risk, security operations, incident response, and customer transparency.

Vulnerability and Patch Management

EQS maintains vulnerability management processes covering infrastructure, applications, dependencies, cloud services, containers, and supporting systems. Newly disclosed vulnerabilities are assessed using exploitability, exposure, reachability, affected services, affected data, compensating controls, dependency context, and evidence of active exploitation.

For critical vulnerabilities affecting customer-facing services, EQS applies expedited triage, emergency change handling, and prioritized remediation or containment. Where a fix cannot be safely deployed immediately, compensating controls may be applied to reduce exposure and blast radius while remediation proceeds.

EQS is continuously strengthening automated security checks, dependency visibility, software bill of materials coverage, reachability-based prioritization, and AI-assisted review in development workflows.

Vulnerability Prioritization and Use of CVSS

EQS does not rely on CVSS as the primary driver for vulnerability prioritization. CVSS may be considered as one contextual input where available, but it has never been a decisive factor in EQS vulnerability handling and is even less suitable as a standalone prioritization mechanism in the current threat environment.

Many SaaS-specific vulnerabilities do not have a CVE at all. CVEs are typically available for known components or publicly disclosed issues, but not for all application-specific, configuration-specific, or business-logic weaknesses. In addition, the fact that a component has a vulnerability does not automatically determine the actual risk for a service using it. Exposure, reachability, exploitability, compensating controls, and business impact are decisive.

EQS prioritizes vulnerabilities based on practical risk to EQS services and customers, including active exploitation, exploit availability, internet exposure, affected asset criticality, data sensitivity, dependency context, and operational impact. This prioritization can function independently of whether a CVE or CVSS score is available.

This approach also reflects the increasing strain on public vulnerability infrastructure. The CVE and NVD ecosystem is facing record vulnerability volumes, delayed or incomplete enrichment, and changing prioritization models. NIST has stated that CVE submissions increased by 263% between 2020 and 2025 and that NVD will no longer immediately enrich all CVEs or routinely provide separate NIST severity scores where a CVE Numbering Authority has already provided one. FIRST has similarly advised organizations to focus on vulnerabilities that pose the greatest risk to their specific environment, not only those with the highest CVSS scores.

Accordingly, EQS treats CVSS as a useful reference point, not as a substitute for exposure-based, exploitability-based, and business-impact-based security judgment.

Detection of Emerging Attack Patterns

EQS uses a combination of threat intelligence, vendor advisories, security monitoring, vulnerability feeds, automated tooling, and internal security analysis to identify emerging attack techniques. We explicitly consider AI-enabled attack acceleration in security planning, including higher vulnerability volumes, faster exploit development, and increased pressure on triage and remediation workflows.

Our security strategy is moving from traditional vulnerability counting toward exposure management: prioritizing what is exploitable, reachable, business-critical, or actively targeted.

Protection Against Zero-Day Exploits

No organization can guarantee prevention of all zero-day exploitation. EQS therefore applies layered controls designed to limit the likelihood and impact of unknown vulnerabilities. These include secure configuration baselines, least-privilege access, privileged-access protections, network and service segmentation, logging and monitoring, hardened deployment pipelines, application security testing, dependency controls, and containment procedures.

The goal is to reduce reachable attack surface, limit lateral movement, detect suspicious behavior early, and preserve the ability to contain or recover quickly.

Incident Response and Escalation

EQS maintains incident response processes with defined escalation paths, internal ownership, customer communication procedures, and management involvement for significant security events. For rapidly evolving vulnerability or exploitation scenarios, EQS can activate expedited assessment, containment, remediation, and communication workflows.

Customers are informed through the appropriate contractual and operational channels when a confirmed security issue materially affects the confidentiality, integrity, availability, or risk profile of services provided to them.

Ongoing Security Enhancements

EQS is continuously enhancing its security practices in light of AI-enabled threats. Current focus areas include:

  • AI-aware Secure SDLC controls
  • stronger vulnerability and dependency visibility
  • faster triage and remediation workflows
  • AI-assisted code and security review
  • tabletop exercises for rapid-exploitation and multi-vulnerability scenarios
  • improved security telemetry and evidence capture
  • governance for AI systems, agents, connectors, and automation
  • developer and security-team training for AI-era risks

This work is intended to improve defensive speed and governance quality without disclosing sensitive internal architecture, tooling configuration, or operational playbooks.

Third Parties and Subprocessors

EQS manages third-party and subprocessor risk through due diligence, contractual security expectations, supplier monitoring, compliance reviews, and review of relevant advisories or incidents.

EQS uses multiple sources and tools to monitor third-party risk. Where an increased risk signal is identified for a relevant supplier, EQS receives alerts and assesses the potential impact on services, data, and customers. These signals may include security advisories, vulnerability information, external risk indicators, compliance changes, potential “dark web” reports and data leakages, incident notifications, or other material changes in the supplier’s risk profile.

In addition to ongoing monitoring, EQS performs periodic compliance reviews of relevant suppliers, including an annual review cycle for applicable third parties and subprocessors. Where third-party technology forms part of EQS services, vulnerabilities are assessed according to exposure, exploitability, service impact, and available compensating controls.

EQS expects relevant suppliers to support timely vulnerability handling, security communication, and incident cooperation.

Transparency and Communication

EQS provides security transparency through the Trust Center, contractual documentation, and direct customer communication where appropriate. Public Trust Center materials describe our control approach at a level suitable for customers and auditors. For security reasons, EQS does not publicly disclose detailed detection logic, internal tooling configuration, supplier-specific exposure maps, vulnerability backlogs, or incident playbooks.

EQS will continue to monitor AI-enabled vulnerability discovery and update its security practices as the threat landscape evolves.

Relevant Public References


For security-related questions, customers may open a request against the InfoSec queue on our Support Center or contact EQS Information Security at infosec@eqs.com.

Dr. Marco Ermini
Chief Information Security Officer, EQS Group

TISAX AL3 Labels for EQS location in Denver

Compliance

We’re excited to share that EQS Groups Denver location has successfully achieved TISAX® Assessment Level 3 (AL3) for the following objectives:

• Data protection (including special categories of personal data)
• Very high availability
• Strict confidentiality

This is the highest assessment level within the TISAX framework and confirms that our site meets very stringent information security requirements expected by partners in the automotive industry. The scope covers all relevant processes and resources related to the collection, storage, and processing of information.

The assessment is valid until September 23, 2028, reinforcing our long-term commitment to maintaining strong security standards and building trust with our customers and partners.
The TISAX decorative assessment document can be accessed here in our Trust Center at https://trust.eqs.com/product/eqsgroup/tisax

Planned Maintenance Notification – Private Cloud Hosting (T-Systems)

Compliance

We would like to inform you about an upcoming migration to a new hosting platform affecting customers using Compliance Cockpit and BKMS System with private cloud hosting at T-Systems.

Schedule & Scope

Saturday, April 18, 10:00 – 12:00 (CEST)

Migration of Data Center and Integrity Line

Impact: During the maintenance window, users may experience short interruptions affecting login, web intake, and the Compliance Cockpit.

Sunday, April 19, 10:00 – 12:00 (CEST)

Migration of BKMS System

Impact: During the maintenance window, users may experience short interruptions affecting login, web intake, and the BKMS System.

Additional Information

We are working to minimise any disruption and ensure a smooth transition to the new hosting environment. Services will be fully restored once the maintenance windows are completed.

If you have any questions, please contact our support team.

Thank you for your understanding.

Shai-Hulud 2.0 Supply Chain Attack – no impact to EQS

Vulnerabilities

Popular projects from Zapier, ENS Domains, PostHog, and Postman were temporarily "trojanized" by threat actors, leading to GitHub repos populated with stolen victim data. Some of these packages are highly prevalent with several developers.

Newly compromised packages continue to surface. The number of identified compromised packages is steadily growing, currently at circa 700. The blast radius is already massive – 25,000+ malicious repos across circa 500 GitHub users. For more technical information, kindly see this post from Wiz: https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack

What has EQS done?

First, EQS does not use GitHub directly. EQS hosts its source code on private, internal repositories. Packages borrowed from public repositories are tightly scanned with multiple tools and vetted before inclusion and use.

To identify this potential threat, EQS has built a dedicated scanner which tries to identify known compromised packages and inspect dependencies against them. The scanner also parses all installation actions from packages, since exploitation happens during the installation. EQS has simulated how installation scripts work to identify signs of malicious traffic and exploitation.

Furthermore, potential secret exposures coming from the CI/CD pipeline has been assessed. All variables in the CI/CD pipelines has been inspected to detect cloud credentials, Kubernetes registry credentials, SSH keys, and so on.

Finally, we have used our CNAPP tool to scan for the presence of vulnerable packages directly on our hosting environments (both QA and production).

Results

EQS has detected no signs of compromise or vulnerability to this attack.

For further information, don't hesitate to contact infosec@eqs.com.

EQS Group expands the scope of its ISO/IEC 27001, 27017, and 27018 certification

Compliance

In May, EQS Group completed its ISO/IEC 27001/27017/27018 re-certification. After two successful onsite audits in Denver, Colorado, U.S.A., in September and Neuilly-sur-Seine (Paris), France, in October, EQS Group is delighted to announce that both locations are now part of the certification scope and listed in the certificate.

EQS Group maintains strict security measures as part of its Information Security Management System at all of its offices worldwide. By adding these two major offices to the certification scope and therefore subjecting them to regular external surveillance audits, EQS Group further enhances transparency and strengthens trust with customers internationally, reinforcing its pledge to secure and reliable handling of sensitive data for its 14,000+ customers.

Interested parties can reach the ISO/IEC certificate in English and German at this URL: https://trust.eqs.com/product/EQS+Group/iso27001

If you need help using this EQS Trust Center, please contact us.
Contact support
If you think you may have discovered a vulnerability, please send us a note.
Report issue