(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2230 articles

Malware

Malicious Apache module used for content injection: Linux/Chapro.A

Malicious Apache module used for content injection: Linux/Chapro.A

Malware

Malicious Apache module used for content injection: Linux/Chapro.A

More than half of all web servers on the Internet use Apache, so when we discovered a malicious Apache module in the wild last month, we were understandably concerned.

Pierre-Marc Bureau18 Dec 2012


A Load of (Red) Bull

A Load of (Red) Bull

A Load of (Red) Bull

A hoax/chain message claiming that a well-known energy drink poses a serious threat to health, is now spreading on Facebook.

David Harley17 Dec 2012


Digital Security

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Digital Security

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Aryeh Goretsky13 Dec 2012


Advanced Heuristics

Advanced Heuristics

Advanced Heuristics

Righard Zwienenberg13 Dec 2012


Mobile Security

Trends for 2013: astounding growth of mobile malware

Trends for 2013: astounding growth of mobile malware

Mobile Security

Trends for 2013: astounding growth of mobile malware

Sebastián Bortnik11 Dec 2012


Are your USB flash drives an infectious malware delivery system?

Are your USB flash drives an infectious malware delivery system?

Are your USB flash drives an infectious malware delivery system?

Stephen Cobb11 Dec 2012


Scams

Diamonds are forever, and so are investment scams

Diamonds are forever, and so are investment scams

Scams

Diamonds are forever, and so are investment scams

Tempted to invest in colour diamonds or collectible bottles of wine? That irresistible offer could be a boiler room scam.

David Harley10 Dec 2012


Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

419 (Advance Fee Fraud) scams aren't amusing to the victim, but the chutzpah of a dictator's wife claiming her $700m Swiss bankroll back is worth a chortle.

David Harley09 Dec 2012


My Little Pronny: Autorun worms continue to turn

My Little Pronny: Autorun worms continue to turn

My Little Pronny: Autorun worms continue to turn

Stephen Cobb07 Dec 2012