(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2220 articles

ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

Discarded, not destroyed: Old routers reveal corporate secrets

ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'

Cameron Camp and Tony Anscombe18 Apr 2023


ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems

ESET Research30 Mar 2023


ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds

Lukas Stefanko and Peter Strýček16 Mar 2023


ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group

Facundo Muñoz14 Mar 2023


ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information

Lukas Stefanko07 Mar 2023


ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol

Alexandre Côté Cyr02 Mar 2023


ESET Research

BlackLotus UEFI bootkit: Myth confirmed

BlackLotus UEFI bootkit: Myth confirmed

ESET Research

BlackLotus UEFI bootkit: Myth confirmed

The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality

Martin Smolár01 Mar 2023


ESET Research

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

ESET Research

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.

ESET Research28 Feb 2023


Ukraine Crisis – Digital Security Resource Center

A year of wiper attacks in Ukraine

A year of wiper attacks in Ukraine

Ukraine Crisis – Digital Security Resource Center

A year of wiper attacks in Ukraine

ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022

ESET Research24 Feb 2023