(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Kelihos: not Alien Resurrection, more Attack of the Clones

Kelihos: not Alien Resurrection, more Attack of the Clones

Kelihos: not Alien Resurrection, more Attack of the Clones

How the Kelihos botnet survived a stake through the heart, and some alternatives to garlic and silver bullets.

David Harley10 Mar 2012


Digital Security

SKYPE: (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications

SKYPE: (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications

Digital Security

SKYPE: (S)ecurely (K)eep (Y)our (P)ersonal (E)-communications

Righard Zwienenberg08 Mar 2012


Malware

Changing how people see the malware threat: images can make a difference

Changing how people see the malware threat: images can make a difference

Malware

Changing how people see the malware threat: images can make a difference

Stephen Cobb06 Mar 2012


Security professionals DO use anti-virus

Security professionals DO use anti-virus

Security professionals DO use anti-virus

And you should also bear in mind that some of the security experts who are denigrating AV en masse right now have their own commercial agendas to push, in favour of other technologies that are not the 100 Per Cent Solution either.

David Harley05 Mar 2012


Information Security Disconnect: RSA, USB, AV, and reality

Information Security Disconnect: RSA, USB, AV, and reality

Information Security Disconnect: RSA, USB, AV, and reality

Stephen Cobb05 Mar 2012


Find the bad guy in a deluge of big data - RSA day three

Find the bad guy in a deluge of big data - RSA day three

Find the bad guy in a deluge of big data - RSA day three

Cameron Camp02 Mar 2012


Digital Security

SMB cyber security: we feel your pain - RSA day two

SMB cyber security: we feel your pain - RSA day two

Digital Security

SMB cyber security: we feel your pain - RSA day two

Cameron Camp01 Mar 2012


Mobile Security

Rogue mobile devices in your enterprise? RSA day one

Rogue mobile devices in your enterprise? RSA day one

Mobile Security

Rogue mobile devices in your enterprise? RSA day one

Cameron Camp29 Feb 2012


The BYOD security challenge: How scary is the iPad, tablet, smartphone surge?

The BYOD security challenge: How scary is the iPad, tablet, smartphone surge?

The BYOD security challenge: How scary is the iPad, tablet, smartphone surge?

Cameron Camp28 Feb 2012