White Papers

91 reports

Windows 10 security and privacy: An in-depth review and analysis

Windows 10 security and privacy: An in-depth review and analysis

As Windows 10 nears its one year anniversary, WeLiveSecurity gives an in-depth review of the operating system from a security and privacy perspective.


Visiting the bear Den Presentation for REcon 2016

Visiting the bear Den Presentation for REcon 2016

A journey in the land of (Cyber-) espionage - stunning presentation by ESET researchers JoanCalvet, Jessy Campos and Thomas Dupuy.


Operation Groundbait: Analysis of a surveillance toolkit

Operation Groundbait: Analysis of a surveillance toolkit

Operation Groundbait (Russian: Прикормка, Prikormka) is an ongoing cyber-surveillance operation targeting individuals in Ukraine. The group behind this operation has been launching targeted and possibly politically-motivated attacks to spy on individuals.
This paper presents ESET’s findings about Operation Groundbait based on our re- search into the Prikormka malware family.


Operation Buhtrap Presentation for AVAR2015

Operation Buhtrap Presentation for AVAR2015

A presentation by Jean-Ian Boutin, Anton Cherepanov and Jan Matušík, detailing Operation Buhtrap.


The Rise of Android Ransomware

The Rise of Android Ransomware

Ransomware is a growing problem for users of mobile devices. Lock-screen types and fine-encrypting “crypto-ransomware”, both of which have been causing major financial and data losses for many years, have made their way to the Android platform. This report discusses further.


Windows Exploitation in 2015

Windows Exploitation in 2015

A new version of our earlier report on major trends in Windows exploitation and mitigation for 2015.


Windows 10: Should you go there?

Windows 10: Should you go there?

Windows 10: Should you go there?


Is Anti-Virus dead?

Is Anti-Virus dead?

Is Anti-Virus dead?


Unpack Your Troubles: .NET packer tricks countermeasures

Unpack Your Troubles: .NET packer tricks countermeasures

Nowadays, .NET samples are increasingly common, necessitating specialized techniques for processing and analysis, especially when obfuscation is used: .NET packers have many tricks up their sleeves, but fortunately we do too.