(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2256 articles

ESET Threat Report H2 2024

ESET Threat Report H2 2024

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč16 Dec 2024


Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET researchers analyze the first UEFI bootkit designed for Linux systems

Martin Smolár and Peter Strýček27 Nov 2024


RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit

Damien Schaeffer and Romain Dumont26 Nov 2024


Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, and to Project Wood

Viktor Šperka21 Nov 2024


ESET Research Podcast: Gamaredon

ESET Research Podcast: Gamaredon

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation

ESET Research13 Nov 2024


Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules

Alexandre Côté Cyr08 Nov 2024


ESET APT Activity Report Q2 2024–Q3 2024

ESET APT Activity Report Q2 2024–Q3 2024

ESET APT Activity Report Q2 2024–Q3 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024

Jean-Ian Boutin07 Nov 2024


CloudScout: Evasive Panda scouting cloud services

CloudScout: Evasive Panda scouting cloud services

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services

Anh Ho28 Oct 2024


ESET Research Podcast: CosmicBeetle

ESET Research Podcast: CosmicBeetle

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

ESET Research24 Oct 2024