(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Win32/Gapz: steps of evolution

Win32/Gapz: steps of evolution

Win32/Gapz: steps of evolution

Win32/Gapz has a new technique for code injection and a new VBR infection method. The dropper has many tricks for bypassing detection by security software.

Aleksandr Matrosov27 Dec 2012


Securing Your Holiday Tech Gifts, Part 2: Android Guide

Securing Your Holiday Tech Gifts, Part 2: Android Guide

Securing Your Holiday Tech Gifts, Part 2: Android Guide

Cameron Camp21 Dec 2012


Malware

Malicious Apache Module: a clarification

Malicious Apache Module: a clarification

Malware

Malicious Apache Module: a clarification

Apache modules are add-on code taking advantage of the Apache module API to extend the functionality of the standard Apache distro. In this case, the binary's functionality was malicious, but there is no exploitation of a known Apache vulnerability in this case.

David Harley20 Dec 2012


Malware

Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems

Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems

Malware

Win32/Spy.Ranbyus modifying Java code in RBS Ukraine systems

Win32/Spy.Ranbyus shows how it is possible to bypass payment transaction signing/authentication with smartcard devices and has started to modify java code in one of the most popular remote banking systems (RBS) in the Ukraine.

Aleksandr Matrosov19 Dec 2012


Malware

Malicious Apache module used for content injection: Linux/Chapro.A

Malicious Apache module used for content injection: Linux/Chapro.A

Malware

Malicious Apache module used for content injection: Linux/Chapro.A

More than half of all web servers on the Internet use Apache, so when we discovered a malicious Apache module in the wild last month, we were understandably concerned.

Pierre-Marc Bureau18 Dec 2012


A Load of (Red) Bull

A Load of (Red) Bull

A Load of (Red) Bull

A hoax/chain message claiming that a well-known energy drink poses a serious threat to health, is now spreading on Facebook.

David Harley17 Dec 2012


Digital Security

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Digital Security

Securing Your Holiday Tech Gifts, Part 1: Windows PC Guide

Aryeh Goretsky13 Dec 2012


Advanced Heuristics

Advanced Heuristics

Advanced Heuristics

Righard Zwienenberg13 Dec 2012


Mobile Security

Trends for 2013: astounding growth of mobile malware

Trends for 2013: astounding growth of mobile malware

Mobile Security

Trends for 2013: astounding growth of mobile malware

Sebastián Bortnik11 Dec 2012