(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Waski downloader spreads banker Trojan targeting users worldwide

Waski downloader spreads banker Trojan targeting users worldwide

Waski downloader spreads banker Trojan targeting users worldwide

If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.

Raphael Labaca Castro08 Apr 2015


ESET Research

Will Windows 10 leave enterprises vulnerable to zero-days?

Will Windows 10 leave enterprises vulnerable to zero-days?

ESET Research

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

Aryeh Goretsky13 Mar 2015


Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Marc-Etienne M.Léveillé09 Mar 2015


Privacy

Fer O’Neil: Say What? Required contents of notice in data breach notifications

Fer O’Neil: Say What? Required contents of notice in data breach notifications

Privacy

Fer O’Neil: Say What? Required contents of notice in data breach notifications

With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?

Guest Author21 Feb 2015


Video

How to spot a Facebook hoax

How to spot a Facebook hoax

Video

How to spot a Facebook hoax

Hoaxes are all over Facebook so it's vital that you know what to look out for. Keep in mind these 5 top tips when scrolling through your news feed.

Kyle Ellison10 Feb 2015


Video

How to stay safe on social media – 5 top tips

How to stay safe on social media – 5 top tips

Video

How to stay safe on social media – 5 top tips

As social media becomes an increasingly large part of our everyday lives, It's easy to forget the dangers hiding behind our feeds. So, remember these five top tips next time you login to Facebook and Twitter.

Kyle Ellison09 Feb 2015


Video

How to keep your webcam safe from hackers

How to keep your webcam safe from hackers

Video

How to keep your webcam safe from hackers

Last year webcam security became a high priority after an anonymous website began posting live streams of the world's unprotected webcams. Here are 5 top tips to keep yours safe from the hackers.

Kyle Ellison06 Feb 2015


MSIL/Agent.PYO: Have botnet, will travel

MSIL/Agent.PYO: Have botnet, will travel

MSIL/Agent.PYO: Have botnet, will travel

ESET's researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.

Sébastien Duquette29 Jan 2015


Ransomware

CTB-Locker: Multilingual Malware Demands Ransom

CTB-Locker: Multilingual Malware Demands Ransom

Ransomware

CTB-Locker: Multilingual Malware Demands Ransom

Starting a few days ago, we began receiving multiple reports of malware-spreading campaigns in various countries mostly in Latin America and Eastern Europe.

Pablo Ramos21 Jan 2015