(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture

Stephen Cobb04 Apr 2012


VirusTotal, Useful Engines, and Useful AV

VirusTotal, Useful Engines, and Useful AV

VirusTotal, Useful Engines, and Useful AV

The paper by Julio Canto and myself on the use and misuse of multi-scanner malware-checking resources like VirusTotal is now available.

David Harley02 Apr 2012


Saturday Night Backup Fever, Internet Apocalypse Now

Saturday Night Backup Fever, Internet Apocalypse Now

Saturday Night Backup Fever, Internet Apocalypse Now

Stephen Cobb31 Mar 2012


Blackhole, CVE-2012-0507 and Carberp

Blackhole, CVE-2012-0507 and Carberp

Blackhole, CVE-2012-0507 and Carberp

The Blackhole exploit kit has been updated to version 1.2.3 and includes a new exploit for the Java CVE-2012-0507 vulnerability, which ESET calls Java/ Exploit.CVE-2012-0507

David Harley30 Mar 2012


Malware

Vulnerable WordPress Leads to Security Blog Infection

Vulnerable WordPress Leads to Security Blog Infection

Malware

Vulnerable WordPress Leads to Security Blog Infection

Robert Lipovsky27 Mar 2012


Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Stephen Cobb26 Mar 2012


Privacy

Facebook logins toxic for employers, violate security and privacy principles

Facebook logins toxic for employers, violate security and privacy principles

Privacy

Facebook logins toxic for employers, violate security and privacy principles

Stephen Cobb24 Mar 2012


Digital Security

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

Digital Security

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

New botnet targets nationals of Georgia.

Righard Zwienenberg21 Mar 2012


Win32/Carberp Gang on the Carpet

Win32/Carberp Gang on the Carpet

Win32/Carberp Gang on the Carpet

Group-IB's joint investigations with the FSB and MVD resulted in the arrest of a gang of eight accused of larceny, creation of malware, and unauthorized access.

David Harley20 Mar 2012