(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Privacy

New Facebook Privacy Controls Arrive on Wednesday

New Facebook Privacy Controls Arrive on Wednesday

Privacy

New Facebook Privacy Controls Arrive on Wednesday

ESET Research25 May 2010


Digital Security, Cybercrime

Carr’s Four Cyber Trends That Must Be Reversed Now

Carr’s Four Cyber Trends That Must Be Reversed Now

Digital Security, Cybercrime

Carr’s Four Cyber Trends That Must Be Reversed Now

ESET Research25 May 2010


Malware

Library of Congress Acquires Entire Twitter Archive

Library of Congress Acquires Entire Twitter Archive

Malware

Library of Congress Acquires Entire Twitter Archive

Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is being used for more command and control functionality. As soon as it becomes available, we’ll follow up. :)

ESET Research25 May 2010


GoGo Gone

GoGo Gone

GoGo Gone

ESET Research24 May 2010


Cybercrime

Cyber-crimefighters pwn Carders.cc

Cyber-crimefighters pwn Carders.cc

Cybercrime

Cyber-crimefighters pwn Carders.cc

ESET Research24 May 2010


Malware

Bricking your cell phone: Mayhem on a Massive Scale

Bricking your cell phone: Mayhem on a Massive Scale

Malware

Bricking your cell phone: Mayhem on a Massive Scale

What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.

ESET Research24 May 2010


Digital Security

Debate Heating Up: Cybersecurity Act of 2010 S. 773

Debate Heating Up: Cybersecurity Act of 2010 S. 773

Digital Security

Debate Heating Up: Cybersecurity Act of 2010 S. 773

ESET Research22 May 2010


DoD Cyber Command is officially online

DoD Cyber Command is officially online

DoD Cyber Command is officially online

ESET Research21 May 2010


Should I Stay or Should I Go?

Should I Stay or Should I Go?

Should I Stay or Should I Go?

ESET Research21 May 2010