(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Microsoft and the Antivirus Industry

Microsoft and the Antivirus Industry

Microsoft and the Antivirus Industry

ESET Research21 Nov 2006


Does Vista need anti-virus?

Does Vista need anti-virus?

Does Vista need anti-virus?

ESET Research21 Nov 2006


Spycar: What Can It Tell You?

Spycar: What Can It Tell You?

Spycar: What Can It Tell You?

At ESET we believe that NOD32 should detect and block bad programs, not detect everything and then make you figure out if the toolbar you want to install is good or bad.

ESET Research26 Oct 2006


A busy night at the Stration

A busy night at the Stration

A busy night at the Stration

The Win32/Stration family of worms has kept ESET's analysts busy over the last few days; but last night, with close to 50 variants being released in one go, they were able to go home and get some sleep. Why?

Andrew Lee20 Oct 2006


The Hamburglar Meets the iPod

The Hamburglar Meets the iPod

The Hamburglar Meets the iPod

There is only one way that software (or hardware with software on it) releases with the wrong data (malware is the wrong data). That is if the company releasing the data doesn't know what they are releasing.

ESET Research17 Oct 2006


ESET NOD32 Blocks VML Exploit Attacks

ESET NOD32 Blocks VML Exploit Attacks

ESET NOD32 Blocks VML Exploit Attacks

ESET's NOD32 is the first known anti-virus product to detect all known types of VML exploit. This detection and blocking prevents attackers from gaining control of the users PC and then running other malicious software.

ESET Research26 Sep 2006


Is ZERT Right for You?

Is ZERT Right for You?

Is ZERT Right for You?

ZERT is a group of security researchers who feel that the danger of the vulnerability and lack of an MS patch warrants creating their own temporary patch.

ESET Research22 Sep 2006


ESET Warns of New Vulnerability Affecting IE

ESET Warns of New Vulnerability Affecting IE

ESET Warns of New Vulnerability Affecting IE

As of this writing we have not seen malicious code exploiting this vulnerability, but that does not mean it will not happen.

ESET Research15 Sep 2006


What is a Behavior Blocker?

What is a Behavior Blocker?

What is a Behavior Blocker?

Scanners and behavior blockers both attempt to stop viruses, spyware and other bad programs. The approaches used by scanners and behavior blockers are complementary when a skilled user applies them.

ESET Research11 Sep 2006