(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 11 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

ESET Coordinated Vulnerability Disclosure Policy


2283 articles

Foreign Travel Malware Threat Alert: Watch out for hotel Internet connections

Foreign Travel Malware Threat Alert: Watch out for hotel Internet connections

Foreign Travel Malware Threat Alert: Watch out for hotel Internet connections

Stephen Cobb08 May 2012


Facebook Memes: not always innocuous

Facebook Memes: not always innocuous

Facebook Memes: not always innocuous

A short comment piece on how Facebook memetic games could be used in a data aggregation attack.

David Harley01 May 2012


Support Scam Poll

Support Scam Poll

Support Scam Poll

Internet Storm Center is running a poll on Fake Tech Support Calls, also the topic of a paper for VB 2012.

David Harley01 May 2012


Could your next new car be hacked (should you be scared)?

Could your next new car be hacked (should you be scared)?

Could your next new car be hacked (should you be scared)?

Cameron Camp30 Apr 2012


Privacy and Security in the Consumer Cloud: The not so fine print

Privacy and Security in the Consumer Cloud: The not so fine print

Privacy and Security in the Consumer Cloud: The not so fine print

Stephen Cobb28 Apr 2012


QR Codes and NFC Chips: Preview-and-authorize should be default

QR Codes and NFC Chips: Preview-and-authorize should be default

QR Codes and NFC Chips: Preview-and-authorize should be default

Stephen Cobb23 Apr 2012


DNS Changer (re)lived, new deadline: 9 July 2012!

DNS Changer (re)lived, new deadline: 9 July 2012!

DNS Changer (re)lived, new deadline: 9 July 2012!

Righard Zwienenberg21 Apr 2012


How to recognize a PC support scam

How to recognize a PC support scam

How to recognize a PC support scam

Pointers on how to recognize PC support/coldcalling/ammyy.com/logmein.com scams before you hand over any cash.

David Harley18 Apr 2012


Phishing Using HTML and Intranet Security Settings

Phishing Using HTML and Intranet Security Settings

Phishing Using HTML and Intranet Security Settings

Righard Zwienenberg16 Apr 2012