(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Final DNSChanger warning

Final DNSChanger warning

Final DNSChanger warning

Peter Stancik05 Jul 2012


All Carberp botnet organizers arrested

All Carberp botnet organizers arrested

All Carberp botnet organizers arrested

Carberp is a unique case, with all the guys who organized really big botnets and made big profits (millions of US dollars) being arrested.

Aleksandr Matrosov02 Jul 2012


Support Scammer Update: Misrepresenting Task Manager

Support Scammer Update: Misrepresenting Task Manager

Support Scammer Update: Misrepresenting Task Manager

David Harley describes a support scam that uses a slightly different twist, misrepresenting the output from Windows Task Manager.

David Harley02 Jul 2012


Malware

Win32/Gataka: a banking Trojan ready to take off?

Win32/Gataka: a banking Trojan ready to take off?

Malware

Win32/Gataka: a banking Trojan ready to take off?

Jean-Ian Boutin28 Jun 2012


ZeroAccess? Much too much access...

ZeroAccess? Much too much access...

ZeroAccess? Much too much access...

Why the ZeroAccess rootkit family modifications are important to the end user.

David Harley28 Jun 2012


How much will your driverless car know about you (and who will it tell)?

How much will your driverless car know about you (and who will it tell)?

How much will your driverless car know about you (and who will it tell)?

Cameron Camp27 Jun 2012


ZeroAccess: code injection chronicles

ZeroAccess: code injection chronicles

ZeroAccess: code injection chronicles

New versions of the Zeroaccess bootkit demonstrate alternative approaches to distribution and to bootkit infection on 32- and 64-bit Windows.

Aleksandr Matrosov25 Jun 2012


Social Media

Sharing versus Security: Driving without Brakes

Sharing versus Security: Driving without Brakes

Social Media

Sharing versus Security: Driving without Brakes

Does the enterprise still have a choice about sharing information?

David Harley24 Jun 2012


Digital Security

ACAD/Medre.A Technical Analysis

ACAD/Medre.A Technical Analysis

Digital Security

ACAD/Medre.A Technical Analysis

Robert Lipovsky21 Jun 2012