(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Malware

New White Paper "Trends for 2012: Malware Goes Mobile"

New White Paper "Trends for 2012: Malware Goes Mobile"

Malware

New White Paper "Trends for 2012: Malware Goes Mobile"

Sebastián Bortnik06 Jan 2012


Facebook's timeline to fraud-a-geddon?

Facebook's timeline to fraud-a-geddon?

Facebook's timeline to fraud-a-geddon?

Stephen Cobb04 Jan 2012


Malware

Malware exploits death of North Korea's Kim Jong-il

Malware exploits death of North Korea's Kim Jong-il

Malware

Malware exploits death of North Korea's Kim Jong-il

Sebastián Bortnik04 Jan 2012


Digital Security, Mobile Security

New Year's resolutions for securing your new tablet

New Year's resolutions for securing your new tablet

Digital Security, Mobile Security

New Year's resolutions for securing your new tablet

Cameron Camp03 Jan 2012


Bootkit Threat Evolution in 2011

Bootkit Threat Evolution in 2011

Bootkit Threat Evolution in 2011

ESET researchers examine the evolution of bootkit threats targeting 64-bit Windows over 2011.

David Harley03 Jan 2012


Digital Security

Could hackers break into your Wi-Fi wireless router?

Could hackers break into your Wi-Fi wireless router?

Digital Security

Could hackers break into your Wi-Fi wireless router?

Cameron Camp30 Dec 2011


Passwords, Stratfor, and Newton's 3rd Law of Motion

Passwords, Stratfor, and Newton's 3rd Law of Motion

Passwords, Stratfor, and Newton's 3rd Law of Motion

Dazzlepod is saying ... if your account name comes up, change your current password ... why not assume that your account is compromised and go ahead and change it anyway and everywhere?

David Harley30 Dec 2011


SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA as currently constructed can never work as intended. I'm not going to get into the reasons we don't like it because of its oppressive implications or because it is against our first amendment rights nor for any other reason.

Andrew Lee29 Dec 2011


Digital Security

Stratfor hack - lessons learned

Stratfor hack - lessons learned

Digital Security

Stratfor hack - lessons learned

Cameron Camp29 Dec 2011