(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

ESET Research

Tesco Bank not alone in being targeted by Retefe malware

Tesco Bank not alone in being targeted by Retefe malware

ESET Research

Tesco Bank not alone in being targeted by Retefe malware

Tesco Bank, which recently saw thousands of its customers lose funds to cybercriminals, has been found on the target list of the so-called Retefe malware.

Peter Stancik10 Nov 2016


ESET Research

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

ESET Research

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

ESET's Michael Aguilar takes a deep dive into SMS/messaging clients, security, and privacy.

Michael Aguilar04 Nov 2016


ESET Research

Linux/Moose: Still breathing

Linux/Moose: Still breathing

ESET Research

Linux/Moose: Still breathing

For the past year, ESET and the security firm GoSecure combined their skills in order to research Linux/Moose further. Here's some of what was uncovered.

Editor02 Nov 2016


ESET Research

Lifting the lid on Sednit: A closer look at the software it uses

Lifting the lid on Sednit: A closer look at the software it uses

ESET Research

Lifting the lid on Sednit: A closer look at the software it uses

ESET's threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.

Graham Cluley25 Oct 2016


ESET Research

Cybercriminals target Brazilian routers with default credentials

Cybercriminals target Brazilian routers with default credentials

ESET Research

Cybercriminals target Brazilian routers with default credentials

Criminals are hunting for routers with default credentials and with vulnerabilities in their firmware, with Brazilians the main target.

ESET Research21 Oct 2016


ESET Research

New ESET research paper puts Sednit under the microscope

New ESET research paper puts Sednit under the microscope

ESET Research

New ESET research paper puts Sednit under the microscope

Security researchers at ESET have released their latest research into the notorious and highly experienced Sednit cyberespionage group.

Graham Cluley20 Oct 2016


ESET Research, Internet of Things

At least 15% of home routers are unsecured

At least 15% of home routers are unsecured

ESET Research, Internet of Things

At least 15% of home routers are unsecured

Tests show that software vulnerabilities and weak passwords are common in home routers, with up to 15% of them being unsecured.

Peter Stancik19 Oct 2016


ESET Research

Book of Eli: African targeted attacks

Book of Eli: African targeted attacks

ESET Research

Book of Eli: African targeted attacks

ESET's latest research analyzes a piece of malware active since 2012, but which has targeted one specific country – Libya.

Anton Cherepanov22 Sep 2016


Ransomware

How encryption molded crypto-ransomware

How encryption molded crypto-ransomware

Ransomware

How encryption molded crypto-ransomware

Recently ESET has seen significantly increasing volumes of a particular type of ransomware known as crypto-ransomware, reports Cassius Puodzius.

Cassius Puodzius13 Sep 2016