(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

How To

How to recognize a PC support scam

How to recognize a PC support scam

How To

How to recognize a PC support scam

Pointers on how to recognize PC support/coldcalling/ammyy.com/logmein.com scams before you hand over any cash.

David Harley18 Apr 2012


Phishing Using HTML and Intranet Security Settings

Phishing Using HTML and Intranet Security Settings

Phishing Using HTML and Intranet Security Settings

Righard Zwienenberg16 Apr 2012


Cybercrime

CeCOS VI: The Counter eCrime Operations Summit

CeCOS VI: The Counter eCrime Operations Summit

Cybercrime

CeCOS VI: The Counter eCrime Operations Summit

CeCOS, to be held in Prague between 25-27 April,will again look at operational issues and the development of communal resources for first responders and forensic professionals.

David Harley16 Apr 2012


Malware

Fighting the OSX/Flashback Hydra

Fighting the OSX/Flashback Hydra

Malware

Fighting the OSX/Flashback Hydra

Pierre-Marc Bureau13 Apr 2012


Pinterest security update

Pinterest security update

Pinterest security update

Cameron Camp12 Apr 2012


Will of the WISP: Your company's Written Information Security Program

Will of the WISP: Your company's Written Information Security Program

Will of the WISP: Your company's Written Information Security Program

Stephen Cobb11 Apr 2012


Malware

Mac Flashback Trojan: If you use Java the time to patch your Mac is now

Mac Flashback Trojan: If you use Java the time to patch your Mac is now

Malware

Mac Flashback Trojan: If you use Java the time to patch your Mac is now

Stephen Cobb05 Apr 2012


Exploit Kit plays with smart redirection (amended)

Exploit Kit plays with smart redirection (amended)

Exploit Kit plays with smart redirection (amended)

Aleksandr Matrosov notes a new exploit kit approach to hiding redirects using implicit iFrame injection. (NB Nuclear Pack, not Blackhole.)

Aleksandr Matrosov05 Apr 2012


Free Anti-virus: Worth Every Penny?

Free Anti-virus: Worth Every Penny?

Free Anti-virus: Worth Every Penny?

Why you really might prefer to pay for AV security. Free Fall or Free-for-All?

David Harley05 Apr 2012