(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Malware

The more things change, the more they stay the same

The more things change, the more they stay the same

Malware

The more things change, the more they stay the same

It's something of a truism, that 'old viruses never die', and that certainly seems to be the case for some of the older, more widespread, email worms.

Andrew Lee05 Jul 2011


New U.S. law: nasty website killswitch

New U.S. law: nasty website killswitch

New U.S. law: nasty website killswitch

Cameron Camp05 Jul 2011


Digital Security

Arizona DPS: hacked again – still – really?

Arizona DPS: hacked again – still – really?

Digital Security

Arizona DPS: hacked again – still – really?

Cameron Camp01 Jul 2011


Weapons systems with feet of China clay

Weapons systems with feet of China clay

Weapons systems with feet of China clay

At a time where the West is, generally speaking, not at the top of its game economically, I can see why defence contractors, like anyone else, are anxious to save money, but outsourcing critical systems purely for economic advantage in the hope of submitting the lowest tender is a risky strategy.

David Harley01 Jul 2011


TDL4: Less hype, more history

TDL4: Less hype, more history

TDL4: Less hype, more history

I don’t think there’s such a thing as an indestructible botnet. TDSS is somewhat innovative. It's introduced new twists on old ideas like P2P networks and hiding malware.

David Harley01 Jul 2011


Government hackers hit al-Qaida?

Government hackers hit al-Qaida?

Government hackers hit al-Qaida?

Cameron Camp30 Jun 2011


Social Media

Facebook Facial Recognition – A picture is worth a thousand words

Facebook Facial Recognition – A picture is worth a thousand words

Social Media

Facebook Facial Recognition – A picture is worth a thousand words

ESET Research29 Jun 2011


Well That Was Embarrassing

Well That Was Embarrassing

Well That Was Embarrassing

ESET Research29 Jun 2011


Do you Use Tumblr? Beware!

Do you Use Tumblr? Beware!

Do you Use Tumblr? Beware!

ESET Research28 Jun 2011