(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2219 articles

Blackhole, CVE-2012-0507 and Carberp

Blackhole, CVE-2012-0507 and Carberp

Blackhole, CVE-2012-0507 and Carberp

The Blackhole exploit kit has been updated to version 1.2.3 and includes a new exploit for the Java CVE-2012-0507 vulnerability, which ESET calls Java/ Exploit.CVE-2012-0507

David Harley30 Mar 2012


Malware

Vulnerable WordPress Leads to Security Blog Infection

Vulnerable WordPress Leads to Security Blog Infection

Malware

Vulnerable WordPress Leads to Security Blog Infection

Robert Lipovsky27 Mar 2012


Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Spring Brings Tax-related Scams, Spams, Phish, Malware, and the IRS

Stephen Cobb26 Mar 2012


Privacy

Facebook logins toxic for employers, violate security and privacy principles

Facebook logins toxic for employers, violate security and privacy principles

Privacy

Facebook logins toxic for employers, violate security and privacy principles

Stephen Cobb24 Mar 2012


Digital Security

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

Digital Security

From Georgia With Love: Win32/Georbot information stealing trojan and botnet

New botnet targets nationals of Georgia.

Righard Zwienenberg21 Mar 2012


Win32/Carberp Gang on the Carpet

Win32/Carberp Gang on the Carpet

Win32/Carberp Gang on the Carpet

Group-IB's joint investigations with the FSB and MVD resulted in the arrest of a gang of eight accused of larceny, creation of malware, and unauthorized access.

David Harley20 Mar 2012


Drive-by FTP: a new view of CVE-2011-3544

Drive-by FTP: a new view of CVE-2011-3544

Drive-by FTP: a new view of CVE-2011-3544

Research by Aleksandr Matrosov and Vladimir Kropotov on distribution of a CVE-2011-3544 exploit by FTP.

David Harley17 Mar 2012


Fake Support, And Now Fake Product Support

Fake Support, And Now Fake Product Support

Fake Support, And Now Fake Product Support

Cold-call scammers now claim to be AV support staff, but misuse a widening range of system utilities to con victims into believing they have malware.

David Harley15 Mar 2012


Scams

Support Scammers (mis)using INF and PREFETCH

Support Scammers (mis)using INF and PREFETCH

Scams

Support Scammers (mis)using INF and PREFETCH

As well as misusing Event Viewer, ASSOC or a system CLSID, scammers hijack "prefetch" and "inf" to con victims into believing they have malware.

David Harley15 Mar 2012