(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Malware

Windows Rootkit Requires Reinstall?

Windows Rootkit Requires Reinstall?

Malware

Windows Rootkit Requires Reinstall?

ESET Research28 Jun 2011


Sony lawsuit: security experts fired prior to breach

Sony lawsuit: security experts fired prior to breach

Sony lawsuit: security experts fired prior to breach

Cameron Camp27 Jun 2011


TDSS: botnets, Kademilia and collective consciousness

TDSS: botnets, Kademilia and collective consciousness

TDSS: botnets, Kademilia and collective consciousness

David Harley27 Jun 2011


TDL Tracking: Peer Pressure

TDL Tracking: Peer Pressure

TDL Tracking: Peer Pressure

Recently ... our TDL tracker picked up a brand new plugin for TDL4 kad.dll (Win32/Olmarik.AVA) which we haven’t seen earlier ... we discovered that it implements a particularly interesting network communication protocol ...

David Harley27 Jun 2011


FBI nabs international “scareware” ring

FBI nabs international “scareware” ring

FBI nabs international “scareware” ring

Cameron Camp24 Jun 2011


Giving Cold Callers the Cold Shoulder

Giving Cold Callers the Cold Shoulder

Giving Cold Callers the Cold Shoulder

...And therein lies a problem that goes beyond support scams. The telephone network, like the Internet, isn't very good at recognizing national boundaries. Which is why I have a couple of rules of thumb when it comes to cold callers...

David Harley24 Jun 2011


EU to urge shorter data breach notification times

EU to urge shorter data breach notification times

EU to urge shorter data breach notification times

Cameron Camp23 Jun 2011


Calling for Backup

Calling for Backup

Calling for Backup

...what I had principly in mind at that point was the impact of some 4,800 of its customers whose businesses may have been threatened when data, sites and email on four of its servers were lost...

David Harley23 Jun 2011


Cybercrime

SCADA still scary

SCADA still scary

Cybercrime

SCADA still scary

"Infrastructure Attacks: The Next Generation?" now includes the speaker notes, which hopefully makes it more interesting and useful.

David Harley23 Jun 2011