(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Social Media

Valentine's Day Scams: For the love of money

Valentine's Day Scams: For the love of money

Social Media

Valentine's Day Scams: For the love of money

Stephen Cobb07 Feb 2012


Digital Security

Your Children and Online Safety

Your Children and Online Safety

Digital Security

Your Children and Online Safety

Do you know what your children are doing online, and do they know the risks out there?

David Harley06 Feb 2012


Google responds to Android app Market security with stronger scanning measures

Google responds to Android app Market security with stronger scanning measures

Google responds to Android app Market security with stronger scanning measures

Cameron Camp03 Feb 2012


TDL4 reloaded: Purple Haze all in my brain

TDL4 reloaded: Purple Haze all in my brain

TDL4 reloaded: Purple Haze all in my brain

A new TDL4 sample includes novel privilege escalation mechanisms in the dropper and changes to the hidden storage system.

David Harley02 Feb 2012


Digital Security

CarrierIQ-style data gathering law to require mandatory notification/opt-in?

CarrierIQ-style data gathering law to require mandatory notification/opt-in?

Digital Security

CarrierIQ-style data gathering law to require mandatory notification/opt-in?

Cameron Camp01 Feb 2012


How To

How to improve Facebook account protection with Login Approvals

How to improve Facebook account protection with Login Approvals

How To

How to improve Facebook account protection with Login Approvals

Stephen Cobb01 Feb 2012


Facebook Fakebook: New Trends in Carberp Activity

Facebook Fakebook: New Trends in Carberp Activity

Facebook Fakebook: New Trends in Carberp Activity

Facebook fraud, Carberp, statistics and a DDoS plugin.

David Harley26 Jan 2012


Digital Security

Now you can be forced to decrypt your hard drive?

Now you can be forced to decrypt your hard drive?

Digital Security

Now you can be forced to decrypt your hard drive?

Cameron Camp24 Jan 2012


Tricky Twitter DM hack seeks your credentials, malware infection, and more

Tricky Twitter DM hack seeks your credentials, malware infection, and more

Tricky Twitter DM hack seeks your credentials, malware infection, and more

Stephen Cobb24 Jan 2012