(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2243 articles

ESET Research

ESET Research Podcast: Gamaredon

ESET Research Podcast: Gamaredon

ESET Research

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation

ESET Research13 Nov 2024


ESET Research

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

ESET Research

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules

Alexandre Côté Cyr08 Nov 2024


ESET Research, Threat Reports

ESET APT Activity Report Q2 2024–Q3 2024

ESET APT Activity Report Q2 2024–Q3 2024

ESET Research, Threat Reports

ESET APT Activity Report Q2 2024–Q3 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024

Jean-Ian Boutin07 Nov 2024


ESET Research

CloudScout: Evasive Panda scouting cloud services

CloudScout: Evasive Panda scouting cloud services

ESET Research

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services

Anh Ho28 Oct 2024


ESET Research

ESET Research Podcast: CosmicBeetle

ESET Research Podcast: CosmicBeetle

ESET Research

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

ESET Research24 Oct 2024


ESET Research

Embargo ransomware: Rock’n’Rust

Embargo ransomware: Rock’n’Rust

ESET Research

Embargo ransomware: Rock’n’Rust

Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit

Jan Holman and Tomáš Zvara23 Oct 2024


ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms

Jakub Souček and Radek Jizba10 Oct 2024


ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal

Matías Porolli07 Oct 2024


ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia

Romain Dumont02 Oct 2024