(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

ESET Research

Espionage toolkit targeting Central and Eastern Europe uncovered

Espionage toolkit targeting Central and Eastern Europe uncovered

ESET Research

Espionage toolkit targeting Central and Eastern Europe uncovered

Over the course of the last year, ESET has detected and analyzed several instances of malware used for targeted espionage – dubbed SBDH toolkit.

Tomáš Gardoň01 Jul 2016


Cybercrime

Operation Groundbait: Espionage in Ukrainian war zones

Operation Groundbait: Espionage in Ukrainian war zones

Cybercrime

Operation Groundbait: Espionage in Ukrainian war zones

After BlackEnergy and Operation Potao Express, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.

Robert Lipovsky and Anton Cherepanov18 May 2016


Ransomware

Ransomware is everywhere, but even black hats make mistakes

Ransomware is everywhere, but even black hats make mistakes

Ransomware

Ransomware is everywhere, but even black hats make mistakes

Ransomware is everywhere. At least that might be the impression left by a seemingly endless stream of news reports on recent cyberattacks, reports ESET's Ondrej Kubovič.

Ondrej Kubovič28 Apr 2016


Scams

My video, My first video, Private video: Don’t fall for this Facebook scam

My video, My first video, Private video: Don’t fall for this Facebook scam

Scams

My video, My first video, Private video: Don’t fall for this Facebook scam

My video, My first video, Private video: Don’t fall for this Facebook scam, which is infecting accounts around the world with a very high rate of success.

Lukas Stefanko14 Apr 2016


Mumblehard takedown ends army of Linux servers from spamming

Mumblehard takedown ends army of Linux servers from spamming

Mumblehard takedown ends army of Linux servers from spamming

One year after the release of the technical analysis of the Mumblehard Linux botnet, it is no longer active. ESET, in collaboration with the Cyber Police of Ukraine and CyS Centrum LLC, have taken down the botnet, stopping its spamming activities.

Marc-Etienne M.Léveillé07 Apr 2016


Scams

Buying Ray-Bans? Don’t fall for this Facebook scam

Buying Ray-Bans? Don’t fall for this Facebook scam

Scams

Buying Ray-Bans? Don’t fall for this Facebook scam

Recently, we’ve observed a new wave of scams on Facebook. Crooks are luring social network users to visit bogus Ray-Ban e-shops and buy heavily discounted sunglasses there. Victims’ payment card details are at risk.

Lukas Stefanko06 Apr 2016


Cybercrime

Analysis of the Locky infection process

Analysis of the Locky infection process

Cybercrime

Analysis of the Locky infection process

In recent months, there has been a significant increase in the number of networks and users affected by ransomware known as Locky, discusses ESET's Diego Perez.

Diego Perez04 Apr 2016


ESET Research

Meet Remaiten - a Linux bot on steroids targeting routers and potentially other IoT devices

Meet Remaiten - a Linux bot on steroids targeting routers and potentially other IoT devices

ESET Research

Meet Remaiten - a Linux bot on steroids targeting routers and potentially other IoT devices

ESET researchers are actively monitoring malware that targets embedded systems such as routers, gateways and wireless access points. We call this new threat Linux/Remaiten.

Michal Malik and Marc-Etienne M.Léveillé30 Mar 2016


ESET Research

ESET discovers new USB-based data stealing malware

ESET discovers new USB-based data stealing malware

ESET Research

ESET discovers new USB-based data stealing malware

ESET has discovered a new USB-based data stealer capable of stealthy attacks against air-gapped systems – it is also well-protected against detection and reverse-engineering.

Peter Stancik23 Mar 2016