(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 11 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

ESET Coordinated Vulnerability Disclosure Policy


2283 articles

Malware exploits death of North Korea's Kim Jong-il

Malware exploits death of North Korea's Kim Jong-il

Malware exploits death of North Korea's Kim Jong-il

Sebastián Bortnik04 Jan 2012


New Year's resolutions for securing your new tablet

New Year's resolutions for securing your new tablet

New Year's resolutions for securing your new tablet

Cameron Camp03 Jan 2012


Bootkit Threat Evolution in 2011

Bootkit Threat Evolution in 2011

Bootkit Threat Evolution in 2011

ESET researchers examine the evolution of bootkit threats targeting 64-bit Windows over 2011.

David Harley03 Jan 2012


Could hackers break into your Wi-Fi wireless router?

Could hackers break into your Wi-Fi wireless router?

Could hackers break into your Wi-Fi wireless router?

Cameron Camp30 Dec 2011


Passwords, Stratfor, and Newton's 3rd Law of Motion

Passwords, Stratfor, and Newton's 3rd Law of Motion

Passwords, Stratfor, and Newton's 3rd Law of Motion

Dazzlepod is saying ... if your account name comes up, change your current password ... why not assume that your account is compromised and go ahead and change it anyway and everywhere?

David Harley30 Dec 2011


SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA bytes GoDaddy's business, and it will hurt you too.

SOPA as currently constructed can never work as intended. I'm not going to get into the reasons we don't like it because of its oppressive implications or because it is against our first amendment rights nor for any other reason.

Andrew Lee29 Dec 2011


Stratfor hack - lessons learned

Stratfor hack - lessons learned

Stratfor hack - lessons learned

Cameron Camp29 Dec 2011


Latest round of hacktivism highlights questions at the heart of hacking

Latest round of hacktivism highlights questions at the heart of hacking

Latest round of hacktivism highlights questions at the heart of hacking

Stephen Cobb28 Dec 2011


2012 Malware and Cybercrime Predictions: The video version

2012 Malware and Cybercrime Predictions: The video version

2012 Malware and Cybercrime Predictions: The video version

Stephen Cobb23 Dec 2011