(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2232 articles

Politicians Better at Security than Twitter, Yahoo, and Amazon

Politicians Better at Security than Twitter, Yahoo, and Amazon

Politicians Better at Security than Twitter, Yahoo, and Amazon

ESET Research04 Mar 2011


Here's my support desk!

Here's my support desk!

Here's my support desk!

got a phone call from a gentleman with a pronounced accent wanting to help me with my virus problem ... You didn't know I had a virus problem? Neither did I, but he assured me that I was spraying malware all over the part of town I live and work in.

David Harley04 Mar 2011


Facebook Spam: the Fifth Wave

Facebook Spam: the Fifth Wave

Facebook Spam: the Fifth Wave

David Harley04 Mar 2011


WordPress.com Survives DDOS Attack

WordPress.com Survives DDOS Attack

WordPress.com Survives DDOS Attack

ESET Research03 Mar 2011


Where's your IT support desk when you need it?

Where's your IT support desk when you need it?

Where's your IT support desk when you need it?

...Hanging on the Telephone, By David Harley, Urban Schrott and Jan Zeleznak...As if fake anti-virus products weren’t bad enough, nowadays we have unsolicited phone-calls from fake AV helpdesks. ESET researchers tell you more about support scams...

David Harley03 Mar 2011


Nice Stuxnet Commentary and Hype Deflation

Nice Stuxnet Commentary and Hype Deflation

Nice Stuxnet Commentary and Hype Deflation

David Harley03 Mar 2011


Androids and Gingerbread Men

Androids and Gingerbread Men

Androids and Gingerbread Men

...all the relevant malware they've seen uses exploits that are restricted to Android OS 2.2 and below...

David Harley03 Mar 2011


Social Security Numbers: deja vu all over again

Social Security Numbers: deja vu all over again

Social Security Numbers: deja vu all over again

Social Security Numbers: Identification is STILL not Authentication...

David Harley03 Mar 2011


February ThreatSense Report

February ThreatSense Report

February ThreatSense Report

The February ThreatSense Report is now available...

David Harley03 Mar 2011