(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Comment Spam: what's in a name?

Comment Spam: what's in a name?

Comment Spam: what's in a name?

...I realize that it looks a little self-obsessed to keep writing about comment spam relating to your own blog...

David Harley07 Aug 2011


ESET July Threat Report

ESET July Threat Report

ESET July Threat Report

There is some pretty interesting content in ESET's Threat Report for July.

David Harley05 Aug 2011


Blackhat: breaking SMS – war texting

Blackhat: breaking SMS – war texting

Blackhat: breaking SMS – war texting

Cameron Camp03 Aug 2011


Scams

Win32/Delf.QCZ:Trust Me, I’m Your Anti-Virus

Win32/Delf.QCZ:Trust Me, I’m Your Anti-Virus

Scams

Win32/Delf.QCZ:Trust Me, I’m Your Anti-Virus

Robert Lipovsky03 Aug 2011


Blackhat Cyberwarriors: We ARE the next war frontline (with a fire alarm thrown in)

Blackhat Cyberwarriors: We ARE the next war frontline (with a fire alarm thrown in)

Blackhat Cyberwarriors: We ARE the next war frontline (with a fire alarm thrown in)

Cameron Camp03 Aug 2011


Fix cybersecurity: Rent a cyber-mercenary?

Fix cybersecurity: Rent a cyber-mercenary?

Fix cybersecurity: Rent a cyber-mercenary?

Cameron Camp03 Aug 2011


Shady Business

Shady Business

Shady Business

We (AVIEN) devoted quite a lot of space to one Chinese operation, the NCPH group, in the “AVIEN Malware Defense Guide for the Enterprise”

David Harley03 Aug 2011


Win32/Hodprot: Hot off the Press

Win32/Hodprot: Hot off the Press

Win32/Hodprot: Hot off the Press

A week or so ago we promised you a full paper expanding on our Hodprot is a Hotshot blog. That paper is now available.

David Harley03 Aug 2011


Digital Security

Hacktivism: not a get-out-of-jail card?

Hacktivism: not a get-out-of-jail card?

Digital Security

Hacktivism: not a get-out-of-jail card?

What we're lacking here is a clear differentiation between types of "hacktivist" or, indeed, "activist": much of the commentary that's around at the moment seems to assume that all hacktivists are the same.

David Harley03 Aug 2011