(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Are your USB flash drives an infectious malware delivery system?

Are your USB flash drives an infectious malware delivery system?

Are your USB flash drives an infectious malware delivery system?

Stephen Cobb11 Dec 2012


Scams

Diamonds are forever, and so are investment scams

Diamonds are forever, and so are investment scams

Scams

Diamonds are forever, and so are investment scams

Tempted to invest in colour diamonds or collectible bottles of wine? That irresistible offer could be a boiler room scam.

David Harley10 Dec 2012


Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

Maryam Abacha rides again: yes, Virginia, there IS a Sani-ty Clause!*

419 (Advance Fee Fraud) scams aren't amusing to the victim, but the chutzpah of a dictator's wife claiming her $700m Swiss bankroll back is worth a chortle.

David Harley09 Dec 2012


My Little Pronny: Autorun worms continue to turn

My Little Pronny: Autorun worms continue to turn

My Little Pronny: Autorun worms continue to turn

Stephen Cobb07 Dec 2012


Why Anti-Virus is not a waste of money

Why Anti-Virus is not a waste of money

Why Anti-Virus is not a waste of money

Righard Zwienenberg04 Dec 2012


Password handling: challenges, costs, and current behavior (now with infographic)

Password handling: challenges, costs, and current behavior (now with infographic)

Password handling: challenges, costs, and current behavior (now with infographic)

Stephen Cobb04 Dec 2012


Spying on Tibetan sympathisers and activists: Double Dockster*

Spying on Tibetan sympathisers and activists: Double Dockster*

Spying on Tibetan sympathisers and activists: Double Dockster*

David Harley04 Dec 2012


Online Shopping and a Phishing Pheeding Phrenzy [3]

Online Shopping and a Phishing Pheeding Phrenzy [3]

Online Shopping and a Phishing Pheeding Phrenzy [3]

A shortened and updated version of the advice that David Harley and Andrew Lee gave to potential phish victims in an earlier paper. Part 3 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.

David Harley31 Oct 2012


Scams

Online Shopping and a Phishing Pheeding Phrenzy [2]

Online Shopping and a Phishing Pheeding Phrenzy [2]

Scams

Online Shopping and a Phishing Pheeding Phrenzy [2]

Phishing scams and online shopping. Part 2 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.

David Harley31 Oct 2012