(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2223 articles

Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

ESET APT Activity Report Q4 2022­–Q1 2023

Threat Reports, ESET Research

ESET APT Activity Report Q4 2022­–Q1 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

Jean-Ian Boutin09 May 2023


ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research

Evasive Panda APT group delivers malware via updates for popular Chinese software

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

Facundo Muñoz26 Apr 2023


ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

ESET Research

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

Peter Kálnai and Marc-Etienne M.Léveillé20 Apr 2023


ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

Discarded, not destroyed: Old routers reveal corporate secrets

ESET Research

Discarded, not destroyed: Old routers reveal corporate secrets

When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'

Cameron Camp and Tony Anscombe18 Apr 2023


ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET Research

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems

ESET Research30 Mar 2023


ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET Research

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds

Lukas Stefanko and Peter Strýček16 Mar 2023


ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group

Facundo Muñoz14 Mar 2023


ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET Research

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information

Lukas Stefanko07 Mar 2023


ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET Research

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol

Alexandre Côté Cyr02 Mar 2023