(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2244 articles

Threat Reports, ESET Research

ESET APT Activity Report T2 2022

ESET APT Activity Report T2 2022

Threat Reports, ESET Research

ESET APT Activity Report T2 2022

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022

Jean-Ian Boutin14 Nov 2022


ESET Research

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

ESET Research

Domestic Kitten campaign spying on Iranian citizens with new FurBall malware

APT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware masquerading as an Android translation app

Lukas Stefanko20 Oct 2022


ESET Research

POLONIUM targets Israel with Creepy malware

POLONIUM targets Israel with Creepy malware

ESET Research

POLONIUM targets Israel with Creepy malware

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group

Matías Porolli11 Oct 2022


Threat Reports, ESET Research

ESET Threat Report T2 2022

ESET Threat Report T2 2022

Threat Reports, ESET Research

ESET Threat Report T2 2022

A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč05 Oct 2022


ESET Research

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

ESET Research

Amazon-themed campaigns of Lazarus in the Netherlands and Belgium

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers

Peter Kálnai30 Sep 2022


ESET Research

You never walk alone: The SideWalk backdoor gets a Linux variant

You never walk alone: The SideWalk backdoor gets a Linux variant

ESET Research

You never walk alone: The SideWalk backdoor gets a Linux variant

ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor

Vladislav Hrčka, Thibaut Passilly, Mathieu Tartare14 Sep 2022


ESET Research, Business Security

RDP on the radar: An up-close view of evolving remote access threats

RDP on the radar: An up-close view of evolving remote access threats

ESET Research, Business Security

RDP on the radar: An up-close view of evolving remote access threats

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol

Aryeh Goretsky07 Sep 2022


ESET Research

Worok: The big picture

Worok: The big picture

ESET Research

Worok: The big picture

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files

Thibaut Passilly06 Sep 2022


ESET Research

ESET Research Podcast: Hot security topics at RSA or mostly hype?

ESET Research Podcast: Hot security topics at RSA or mostly hype?

ESET Research

ESET Research Podcast: Hot security topics at RSA or mostly hype?

Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices

ESET Research20 Jul 2022