(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Scams, Cybercrime

Online Poker, Real Fraud

Online Poker, Real Fraud

Scams, Cybercrime

Online Poker, Real Fraud

Aryeh Goretsky21 Sep 2011


Encryption, the Wonderdrug

Encryption, the Wonderdrug

Encryption, the Wonderdrug

One of the recurring themes of the past few years in the UK is data lost by the public sector on USB drives, CDs and so on.

David Harley21 Sep 2011


SSL: Threatened by a BEAST of Prey

SSL: Threatened by a BEAST of Prey

SSL: Threatened by a BEAST of Prey

SSL isn't hopelessly broken, but the widespread use of TLS 1.0 means that SSL cannot be regarded as fully "secure"

David Harley20 Sep 2011


The Good News About Security and Privacy Breaches: An Opportunity to Learn

The Good News About Security and Privacy Breaches: An Opportunity to Learn

The Good News About Security and Privacy Breaches: An Opportunity to Learn

Stephen Cobb19 Sep 2011


Malware

Android banking malware in the wild

Android banking malware in the wild

Malware

Android banking malware in the wild

Cameron Camp16 Sep 2011


Scams

The Online Apartment Rental Scam, Fully Furnished With Multiplier Effect

The Online Apartment Rental Scam, Fully Furnished With Multiplier Effect

Scams

The Online Apartment Rental Scam, Fully Furnished With Multiplier Effect

Stephen Cobb16 Sep 2011


The Dirt on Certs

The Dirt on Certs

The Dirt on Certs

Róbert Lipovský and I put our heads together and posted a joint article to SC Magazine's Cybercrime Corner on "Dead Certs?"

David Harley16 Sep 2011


Sony new Terms of Service – you can’t file a class action suit

Sony new Terms of Service – you can’t file a class action suit

Sony new Terms of Service – you can’t file a class action suit

Cameron Camp15 Sep 2011


Digital Security

Should you hire a hacker to prevent data breaches?

Should you hire a hacker to prevent data breaches?

Digital Security

Should you hire a hacker to prevent data breaches?

Cameron Camp15 Sep 2011