(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2254 articles

Android users: Beware these popularity-faking tricks on Google Play

Android users: Beware these popularity-faking tricks on Google Play

Android users: Beware these popularity-faking tricks on Google Play

Tricksters have been misleading users about the functionality of apps by displaying bogus download numbers

Lukas Stefanko11 Jun 2018


InvisiMole: Surprisingly equipped spyware, undercover since 2013

InvisiMole: Surprisingly equipped spyware, undercover since 2013

InvisiMole: Surprisingly equipped spyware, undercover since 2013

Hunting for secrets from high-profile targets while staying in the shadows

Zuzana Hromcová07 Jun 2018


BackSwap malware finds innovative ways to empty bank accounts

BackSwap malware finds innovative ways to empty bank accounts

BackSwap malware finds innovative ways to empty bank accounts

ESET researchers have discovered a piece of banking malware that employs a new technique to bypass dedicated browser protection measures

Michal Poslušný25 May 2018


Turla Mosquito: A shift towards more generic tools

Turla Mosquito: A shift towards more generic tools

Turla Mosquito: A shift towards more generic tools

ESET researchers have observed a significant change in the campaign of the infamous espionage group

ESET Research22 May 2018


A tale of two zero-days

A tale of two zero-days

A tale of two zero-days

Double zero-day vulnerabilities fused into one. A mysterious sample enables attackers to execute arbitrary code with the highest privileges on intended targets

Anton Cherepanov15 May 2018


One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak

One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak

One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak

The infamous outbreak may no longer be causing mayhem worldwide but the threat that enabled it is still very much alive and posing a major threat to unpatched and unprotected systems

Ondrej Kubovič10 May 2018


Inside fake Interac transfer and tax refund SMS phishing

Inside fake Interac transfer and tax refund SMS phishing

Inside fake Interac transfer and tax refund SMS phishing

It’s tax season in Canada and scammers are using fake tax refund forms to lure victims into supplying their personal information via phishing pages

Marc-Etienne M.Léveillé09 May 2018


Sednit update: Analysis of Zebrocy

Sednit update: Analysis of Zebrocy

Sednit update: Analysis of Zebrocy

Zebrocy heavily used by the Sednit group over last two years

ESET Research24 Apr 2018


Beware ad slingers thinly disguised as security apps

Beware ad slingers thinly disguised as security apps

Beware ad slingers thinly disguised as security apps

ESET researchers have analyzed a newly discovered set of apps on Google Play, Google's official Android app store, that pose as security applications. Instead of security, all they provide is unwanted ads and ineffective pseudo-security.

Lukas Stefanko05 Apr 2018