(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 11 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

ESET Coordinated Vulnerability Disclosure Policy


2283 articles

Job Scams: Nice Work If You Can Get It

Job Scams: Nice Work If You Can Get It

Job Scams: Nice Work If You Can Get It

The new ESET blog format must be striking a real chord with people. At any rate, job offers are just pouring in. Except that they don't seem to be jobs for security bloggers, or for web developers like the team that maintains this site.

David Harley21 Mar 2013


Win32/Cridex: Java pushes Cyprus into a Blackhole

Win32/Cridex: Java pushes Cyprus into a Blackhole

Win32/Cridex: Java pushes Cyprus into a Blackhole

Banking crisis in Cyprus is now being used in a spam campaign promoting the Blackhole exploit kit and the Win32/Cridex Trojan.

David Harley20 Mar 2013


Gapz and Redyms droppers based on Power Loader code

Gapz and Redyms droppers based on Power Loader code

Gapz and Redyms droppers based on Power Loader code

Technical analysis of Power Loader, a special bot builder for making downloaders for other malware families and yet another example of specialization and modularity in malware production.

Aleksandr Matrosov19 Mar 2013


Adobe and Microsoft release critical patches for March

Adobe and Microsoft release critical patches for March

Adobe and Microsoft release critical patches for March

Adobe and Microsoft have both released patches this week to address vulnerabilities in respective software applications and advise all users to apply the patches as soon as possible, if applicable to them.

Rob Waugh14 Mar 2013


Phishbait: not so much a Smile as a rictus

Phishbait: not so much a Smile as a rictus

Phishbait: not so much a Smile as a rictus

David Harley13 Mar 2013


How Theola malware uses a Chrome plugin for banking fraud

How Theola malware uses a Chrome plugin for banking fraud

How Theola malware uses a Chrome plugin for banking fraud

A deep dive into Win32/Theola, one of the most malicious components of the notorious bootkit family, Win32/Mebroot.FX. Theola uses malicious Chrome browser plugins to steal money.

Aleksandr Matrosov13 Mar 2013


Sinkholing of Trojan Downloader Zortob.B reveals fast growing malware threat

Sinkholing of Trojan Downloader Zortob.B reveals fast growing malware threat

Sinkholing of Trojan Downloader Zortob.B reveals fast growing malware threat

Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B

Sébastien Duquette08 Mar 2013


Hundreds of thousands of Facebook likes can certainly be wrong

Hundreds of thousands of Facebook likes can certainly be wrong

Hundreds of thousands of Facebook likes can certainly be wrong

David Harley06 Mar 2013


Caphaw attacking major European banks using webinject plugin

Caphaw attacking major European banks using webinject plugin

Caphaw attacking major European banks using webinject plugin

Analysis of malicious code dubbed Win32/Caphaw (a.k.a. Shylock) attacking major European banks, with ability to automatically steal money when the user is actively accessing his banking account.

Aleksandr Matrosov25 Feb 2013