(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2244 articles

ESET Research

Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers

Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers

ESET Research

Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers

ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible

Matthieu Faou25 Oct 2023


ESET Research

Operation King TUT: The universe of threats in LATAM

Operation King TUT: The universe of threats in LATAM

ESET Research

Operation King TUT: The universe of threats in LATAM

ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting

Camilo Gutiérrez Amaya and Fernando Tavella17 Oct 2023


ESET Research

Operation Jacana: Foundling hobbits in Guyana

Operation Jacana: Foundling hobbits in Guyana

ESET Research

Operation Jacana: Foundling hobbits in Guyana

ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana

Fernando Tavella05 Oct 2023


ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

ESET Research

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor

Peter Kálnai29 Sep 2023


ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET Research

Stealth Falcon preying over Middle Eastern skies with Deadglyph

ESET researchers have discovered Deadglyph, a sophisticated backdoor used by the infamous Stealth Falcon group for espionage in the Middle East

ESET Research22 Sep 2023


ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET Research

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli organizations in 2021 and 2022

Zuzana Hromcová and Adam Burgher21 Sep 2023


ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims

ESET Research12 Sep 2023


ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor

Adam Burgher11 Sep 2023


ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET Research

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs

Lukas Stefanko30 Aug 2023