(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Digital Security, Cybercrime

How secure is TSA? Congress isn’t impressed

How secure is TSA? Congress isn’t impressed

Digital Security, Cybercrime

How secure is TSA? Congress isn’t impressed

Cameron Camp12 Dec 2011


Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Win32/Flooder.Ramagedos botnet participating in DDoS related to elections in Russia

Sébastien Duquette12 Dec 2011


Malware

Malware Drive-by Infection Video: From fake FDIC message to infection

Malware Drive-by Infection Video: From fake FDIC message to infection

Malware

Malware Drive-by Infection Video: From fake FDIC message to infection

Stephen Cobb09 Dec 2011


Secure DNS? Encrypt the last mile

Secure DNS? Encrypt the last mile

Secure DNS? Encrypt the last mile

Cameron Camp08 Dec 2011


Carrier IQ detection: check your source before you install

Carrier IQ detection: check your source before you install

Carrier IQ detection: check your source before you install

Android-specific software that checks for Carrier IQ could create an unanticipated problem.

David Harley08 Dec 2011


Delivery Failure Revisited: Win32/TrojanDownloader.Agent.QXN returns

Delivery Failure Revisited: Win32/TrojanDownloader.Agent.QXN returns

Delivery Failure Revisited: Win32/TrojanDownloader.Agent.QXN returns

Stephen Cobb06 Dec 2011


Carberp white paper: now with added pictures

Carberp white paper: now with added pictures

Carberp white paper: now with added pictures

"Win32/Carberp: When You're in a Black Hole, Stop Digging" aggregates most of our published material on Carberp into a single resource.

David Harley06 Dec 2011


Wi-Fi and fertility: warm but not so fuzzy

Wi-Fi and fertility: warm but not so fuzzy

Wi-Fi and fertility: warm but not so fuzzy

An aspect of mobile computing that affects generations unborn...

David Harley06 Dec 2011


Carberp + BlackHole = growing fraud incidents

Carberp + BlackHole = growing fraud incidents

Carberp + BlackHole = growing fraud incidents

This article examines the relationship between the Black Hole exploit kit and Win32/Carberp.

David Harley04 Dec 2011