(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2215 articles

ESET Research

Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser

Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser

ESET Research

Fleecing the onion: Darknet shoppers swindled out of bitcoins via trojanized Tor Browser

ESET researchers discover a trojanized Tor Browser distributed by cybercriminals to steal bitcoins from darknet market buyers

Anton Cherepanov18 Oct 2019


ESET Research

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed

ESET Research

What was wrong with Alexa? How Amazon Echo and Kindle got KRACKed

ESET Smart Home Research Team uncovers Echo, Kindle versions vulnerable to 2017 Wi-Fi vulnerabilities

Miloš Čermák17 Oct 2019


ESET Research

Operation Ghost: The Dukes aren’t back – they never left

Operation Ghost: The Dukes aren’t back – they never left

ESET Research

Operation Ghost: The Dukes aren’t back – they never left

ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families

ESET Research17 Oct 2019


ESET Research

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

ESET Research

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks

Marc-Etienne M.Léveillé and Mathieu Tartare14 Oct 2019


ESET Research

ESET discovers Attor, a spy platform with curious GSM fingerprinting

ESET discovers Attor, a spy platform with curious GSM fingerprinting

ESET Research

ESET discovers Attor, a spy platform with curious GSM fingerprinting

ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users

Zuzana Hromcová10 Oct 2019


ESET Research

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET Research

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples

Filip Mazán and Frédéric Vachon08 Oct 2019


ESET Research

Casbaneiro: Dangerous cooking with a secret ingredient

Casbaneiro: Dangerous cooking with a secret ingredient

ESET Research

Casbaneiro: Dangerous cooking with a secret ingredient

Número dois in our series demystifying Latin American banking trojans

ESET Research03 Oct 2019


ESET Research

No summer vacations for Zebrocy

No summer vacations for Zebrocy

ESET Research

No summer vacations for Zebrocy

ESET researchers describe the latest components used in a recent Sednit campaign

ESET Research24 Sep 2019


ESET Research

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

ESET Research

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

ESET researchers discovered a backdoor linked to malware used by the Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East

ESET Research09 Sep 2019