(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2232 articles

Malware

Open Source Malware Fingerprinting – Free Tool

Open Source Malware Fingerprinting – Free Tool

Malware

Open Source Malware Fingerprinting – Free Tool

ESET Research26 Aug 2010


Social Media

Share Your Password, Spam Your Friends

Share Your Password, Spam Your Friends

Social Media

Share Your Password, Spam Your Friends

ESET Research26 Aug 2010


DLL loading vulnerability

DLL loading vulnerability

DLL loading vulnerability

Scarcely had we got our breath back mainly after Microsoft addressed a serious vulnerability in handling .LNK (shortcut) files, before researcher HD Moore made public a serious security failure in the dynamic loading of libraries in Windows that came to light when he was investigating the .LNK issue.

David Harley26 Aug 2010


AMTSO's next meeting

AMTSO's next meeting

AMTSO's next meeting

...quite a few other issues have come up that are less obviously related to AMTSO's aims, and it's probably inevitable that some of those concerns will find their way out in the course of the meeting. Watch this space.

David Harley26 Aug 2010


The Strange Case of the Droid 2 Password Lock

The Strange Case of the Droid 2 Password Lock

The Strange Case of the Droid 2 Password Lock

ESET Research25 Aug 2010


Adobe Updates

Adobe Updates

Adobe Updates

David Harley25 Aug 2010


21st Century Hunter-Killer UAV Enters Restricted DC Airspace – Skynet Alive?

21st Century Hunter-Killer UAV Enters Restricted DC Airspace – Skynet Alive?

21st Century Hunter-Killer UAV Enters Restricted DC Airspace – Skynet Alive?

Navy UAV Goes AWOL - SkyNet has not yet been blamed and there was no word about whether this Fire Scout drone was carrying its armament load-out of the Advanced Precision Kill Weapon System or Hellfire missiles.

ESET Research25 Aug 2010


Android Application Security

Android Application Security

Android Application Security

ESET Research19 Aug 2010


I’m Picking Up Good Vibrations

I’m Picking Up Good Vibrations

I’m Picking Up Good Vibrations

ESET Research19 Aug 2010