(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2220 articles

Threat Reports, ESET Research

ESET Threat Report H1 2023

ESET Threat Report H1 2023

Threat Reports, ESET Research

ESET Threat Report H1 2023

A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč11 Jul 2023


ESET Research

What’s up with Emotet?

What’s up with Emotet?

ESET Research

What’s up with Emotet?

A brief summary of what happened with Emotet since its comeback in November 2021

Jakub Kaloč06 Jul 2023


ESET Research

Android GravityRAT goes after WhatsApp backups

Android GravityRAT goes after WhatsApp backups

ESET Research

Android GravityRAT goes after WhatsApp backups

ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files

Lukas Stefanko15 Jun 2023


ESET Research

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade: crimeware or cyberespionage?

ESET Research

Asylum Ambuscade: crimeware or cyberespionage?

A curious case of a threat actor at the border between crimeware and cyberespionage

Matthieu Faou08 Jun 2023


ESET Research

Shedding light on AceCryptor and its operation

Shedding light on AceCryptor and its operation

ESET Research

Shedding light on AceCryptor and its operation

ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families

Jakub Kaloč25 May 2023


ESET Research

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

ESET Research

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio

Lukas Stefanko23 May 2023


Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

ESET APT Activity Report Q4 2022­–Q1 2023

Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

Jean-Ian Boutin09 May 2023


ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

Facundo Muñoz26 Apr 2023


ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 2023