(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Malware

Spam campaign uses Blackhole exploit kit to install SpyEye

Spam campaign uses Blackhole exploit kit to install SpyEye

Malware

Spam campaign uses Blackhole exploit kit to install SpyEye

Sébastien Duquette15 Dec 2011


Digital Security

2012 predictions: online data brokers come under fire

2012 predictions: online data brokers come under fire

Digital Security

2012 predictions: online data brokers come under fire

Cameron Camp14 Dec 2011


Digital Security

Unencrypted credit card storage on the rise

Unencrypted credit card storage on the rise

Digital Security

Unencrypted credit card storage on the rise

Cameron Camp13 Dec 2011


Safety online with a bang: dodging (more) cyberbullets

Safety online with a bang: dodging (more) cyberbullets

Safety online with a bang: dodging (more) cyberbullets

An updated version of the paper "Ten Ways to Dodge CyberBullets", addressing the question "what are the top 10 things that people can do to protect themselves against malicious activity?"

David Harley13 Dec 2011


Malware

2012 Predictions: East of Java

2012 Predictions: East of Java

Malware

2012 Predictions: East of Java

Java will consolidate its position as the successor to PDF and SWF in the favourite exploits stakes.

David Harley12 Dec 2011


Malware and Cybercrime Predictions: 'Tis the season

Malware and Cybercrime Predictions: 'Tis the season

Malware and Cybercrime Predictions: 'Tis the season

Stephen Cobb12 Dec 2011


Digital Security, Cybercrime

How secure is TSA? Congress isn’t impressed

How secure is TSA? Congress isn’t impressed

Digital Security, Cybercrime

How secure is TSA? Congress isn’t impressed

Cameron Camp12 Dec 2011


Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Sébastien Duquette12 Dec 2011


Malware

Malware Drive-by Infection Video: From fake FDIC message to infection

Malware Drive-by Infection Video: From fake FDIC message to infection

Malware

Malware Drive-by Infection Video: From fake FDIC message to infection

Stephen Cobb09 Dec 2011