(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 11 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

ESET Coordinated Vulnerability Disclosure Policy


2283 articles

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

ESET's Michael Aguilar takes a deep dive into SMS/messaging clients, security, and privacy.

Michael Aguilar04 Nov 2016


Linux/Moose: Still breathing

Linux/Moose: Still breathing

Linux/Moose: Still breathing

For the past year, ESET and the security firm GoSecure combined their skills in order to research Linux/Moose further. Here's some of what was uncovered.

Editor02 Nov 2016


Lifting the lid on Sednit: A closer look at the software it uses

Lifting the lid on Sednit: A closer look at the software it uses

Lifting the lid on Sednit: A closer look at the software it uses

ESET's threat analysts have taken a closer look at the software used by Sednit to spy on its targets and steal confidential information.

Graham Cluley25 Oct 2016


Cybercriminals target Brazilian routers with default credentials

Cybercriminals target Brazilian routers with default credentials

Cybercriminals target Brazilian routers with default credentials

Criminals are hunting for routers with default credentials and with vulnerabilities in their firmware, with Brazilians the main target.

ESET Research21 Oct 2016


New ESET research paper puts Sednit under the microscope

New ESET research paper puts Sednit under the microscope

New ESET research paper puts Sednit under the microscope

Security researchers at ESET have released their latest research into the notorious and highly experienced Sednit cyberespionage group.

Graham Cluley20 Oct 2016


At least 15% of home routers are unsecured

At least 15% of home routers are unsecured

At least 15% of home routers are unsecured

Tests show that software vulnerabilities and weak passwords are common in home routers, with up to 15% of them being unsecured.

Peter Stancik19 Oct 2016


Book of Eli: African targeted attacks

Book of Eli: African targeted attacks

Book of Eli: African targeted attacks

ESET's latest research analyzes a piece of malware active since 2012, but which has targeted one specific country – Libya.

Anton Cherepanov22 Sep 2016


How encryption molded crypto-ransomware

How encryption molded crypto-ransomware

How encryption molded crypto-ransomware

Recently ESET has seen significantly increasing volumes of a particular type of ransomware known as crypto-ransomware, reports Cassius Puodzius.

Cassius Puodzius13 Sep 2016


TorrentLocker: Crypto-ransomware still active, using same tactics

TorrentLocker: Crypto-ransomware still active, using same tactics

TorrentLocker: Crypto-ransomware still active, using same tactics

ESET has carried out analysis of new samples of the crypto-ransomware family TorrentLocker, to compare the 2016 campaigns against its research in late 2014.

Marc-Etienne M.Léveillé01 Sep 2016