(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2232 articles

Do You Have a Process?

Do You Have a Process?

Do You Have a Process?

ESET Research01 Jul 2010


I AMTSO confused....

I AMTSO confused....

I AMTSO confused....

...Somewhere in this welter of misinformation, well-meant but muddled thinking, and black propaganda, there are some issues that need clarifying... Watch this space for further information. And while you're waiting, you might want to check the documentation and other resources at the AMTSO web site to see what the organization really proposes and what it is really trying to achieve...

David Harley30 Jun 2010


Adobe, Make My Day Too....

Adobe, Make My Day Too....

Adobe, Make My Day Too....

Adobe, when I disable JavaScript, STOP SILENTLY RE-ENABLING IT WHEN YOU UPDATE....

David Harley30 Jun 2010


Crimeware Across the Globe

Crimeware Across the Globe

Crimeware Across the Globe

...time to share it here: not only for its insights into the Latin American crimeware scene, but even more so as a neat summary of the way in which global crimeware is distributed regionally...

David Harley30 Jun 2010


Tidy TDSS (TDL3) Paper

Tidy TDSS (TDL3) Paper

Tidy TDSS (TDL3) Paper

...Aleksandr Matrosov, Senior Virus Researcher, & Eugene Rodionov, Rootkit Analyst, ... have allowed us to share a long and comprehensive report on the TLD3 rootkit...

David Harley25 Jun 2010


Cybercrime

Anti-Skimming Tips at Debit-only Pumps

Anti-Skimming Tips at Debit-only Pumps

Cybercrime

Anti-Skimming Tips at Debit-only Pumps

ESET Research23 Jun 2010


Support Scam Info: Some More Links

Support Scam Info: Some More Links

Support Scam Info: Some More Links

David Harley23 Jun 2010


Marketing Misusing ESET's Name

Marketing Misusing ESET's Name

Marketing Misusing ESET's Name

The individual concerned had received a phone call from someone claiming to be from Microsoft, and informing him that notification had been received concerning a virus infection on his PC, and offering to help him to install antivirus software. When asked what antivirus software was being offered, the caller claimed that it was ESET's.

David Harley23 Jun 2010


Skimming for Beginners

Skimming for Beginners

Skimming for Beginners

Regrettably, pretty much anything could happen to your credit card while it's out of your sight. However, the "ATM Card Skimming and PIN capturing Awareness Guide", while it can't cover every possible permutation of illicit additives to your friendly local ATM, does at least offer some guidance as to what to look for.

David Harley22 Jun 2010