(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Scams

Authentication attacks: Apple, Amazon, iCloud, Google, anything with a password

Authentication attacks: Apple, Amazon, iCloud, Google, anything with a password

Scams

Authentication attacks: Apple, Amazon, iCloud, Google, anything with a password

Stephen Cobb09 Aug 2012


Support Scammer Anna's CLSID confusion

Support Scammer Anna's CLSID confusion

Support Scammer Anna's CLSID confusion

Scammer Anna claims to be from Global PC Helpline, and certainly that site seems to be confused about what it is and where it operates from.

David Harley09 Aug 2012


Foxxy Software Outfoxed?

Foxxy Software Outfoxed?

Foxxy Software Outfoxed?

Sébastien Duquette07 Aug 2012


Scams

Misusing VERIFY (and other support scam tricks)

Misusing VERIFY (and other support scam tricks)

Scams

Misusing VERIFY (and other support scam tricks)

After Event Viewer, ASSOC, INF, PREFETCH and Task Manager, it seems that VERIFY is the latest system utility to be misused by PC tech support scammers.

David Harley06 Aug 2012


Mac OSX/iOS hacks at Blackhat - are scammers setting their sights?

Mac OSX/iOS hacks at Blackhat - are scammers setting their sights?

Mac OSX/iOS hacks at Blackhat - are scammers setting their sights?

Cameron Camp03 Aug 2012


Flamer Analysis: Framework Reconstruction

Flamer Analysis: Framework Reconstruction

Flamer Analysis: Framework Reconstruction

Aleksandr Matrosov looks at the internal architecture of Win32/Flamer's mssecmgr.ocx module.

Aleksandr Matrosov02 Aug 2012


Rakshasa hardware backdooring: the demon that can't be exorcized?

Rakshasa hardware backdooring: the demon that can't be exorcized?

Rakshasa hardware backdooring: the demon that can't be exorcized?

Jonathan Brossard describes an 'undetectable, unremovable' attack on firmware through gimmicked hardware or a subsequent malware attack. David Harley isn't convinced.

David Harley30 Jul 2012


Defcon focus on the Fed comes with conflicting emotions

Defcon focus on the Fed comes with conflicting emotions

Defcon focus on the Fed comes with conflicting emotions

Cameron Camp30 Jul 2012


Digital Security

Apache/PHP web access holes - are your .htaccess controls really safe

Apache/PHP web access holes - are your .htaccess controls really safe

Digital Security

Apache/PHP web access holes - are your .htaccess controls really safe

Cameron Camp27 Jul 2012