(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Passwords of Plenty*: what 442773 leaked Yahoo! accounts can tell us

Passwords of Plenty*: what 442773 leaked Yahoo! accounts can tell us

Passwords of Plenty*: what 442773 leaked Yahoo! accounts can tell us

If a service leaks your credentials, your options are limited, but changing all your passwords to something harder to guess/break is never a bad idea.

David Harley12 Jul 2012


Digital Security

Scareware on the Piggy-Back of ACAD/Medre.A

Scareware on the Piggy-Back of ACAD/Medre.A

Digital Security

Scareware on the Piggy-Back of ACAD/Medre.A

Righard Zwienenberg11 Jul 2012


Instagram vulnerability can allow strangers access to your photos and more

Instagram vulnerability can allow strangers access to your photos and more

Instagram vulnerability can allow strangers access to your photos and more

Stephen Cobb11 Jul 2012


Java the Hutt meets CVE-2012-1723: the Evil Empire strikes back

Java the Hutt meets CVE-2012-1723: the Evil Empire strikes back

Java the Hutt meets CVE-2012-1723: the Evil Empire strikes back

The Java exploit for CVE-2012-1723 is already included in the latest update of the BlackHole exploit kit.

Aleksandr Matrosov10 Jul 2012


Is my business too small to be hacked by a nation-state (or should I worry)?

Is my business too small to be hacked by a nation-state (or should I worry)?

Is my business too small to be hacked by a nation-state (or should I worry)?

Cameron Camp09 Jul 2012


DNSChanger: lies, damn' lies and telemetry statistics

DNSChanger: lies, damn' lies and telemetry statistics

DNSChanger: lies, damn' lies and telemetry statistics

First the panic, then the accusations of hype. Can we really estimate the impact of DNSchanger yet?

David Harley09 Jul 2012


DNSChanger mini-FAQ

DNSChanger mini-FAQ

DNSChanger mini-FAQ

Some brief answers to questions about the server shutdown that will affect tens/hundreds of thousands of DNSChanger victims on 9th July.

David Harley07 Jul 2012


Digital Security, Cybercrime

Cybercrime and the small business: Basic defensive measures

Cybercrime and the small business: Basic defensive measures

Digital Security, Cybercrime

Cybercrime and the small business: Basic defensive measures

Stephen Cobb05 Jul 2012


Scams

Support scams: social engineering update

Support scams: social engineering update

Scams

Support scams: social engineering update

More cold-call/support scam information.

David Harley05 Jul 2012