(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2215 articles

ESET Research

Unboxing Linux/Mumblehard: Muttering spam from your servers

Unboxing Linux/Mumblehard: Muttering spam from your servers

ESET Research

Unboxing Linux/Mumblehard: Muttering spam from your servers

Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.

Marc-Etienne M.Léveillé29 Apr 2015


How To

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

How To

Advanced Persistent Threats: Using multi-layered detection to defend against APTs

Advanced persistent threats (APTs) are a growing concern to the world's companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.

Aryeh Goretsky15 Apr 2015


ESET Research

Operation Buhtrap, the trap for Russian accountants

Operation Buhtrap, the trap for Russian accountants

ESET Research

Operation Buhtrap, the trap for Russian accountants

The Operation Buhtrap campaign targets a wide range of Russian banks, used several different code signing certificates and implements evasive methods to avoid detection.

Jean-Ian Boutin09 Apr 2015


Waski downloader spreads banker Trojan targeting users worldwide

Waski downloader spreads banker Trojan targeting users worldwide

Waski downloader spreads banker Trojan targeting users worldwide

If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.

Raphael Labaca Castro08 Apr 2015


ESET Research

Will Windows 10 leave enterprises vulnerable to zero-days?

Will Windows 10 leave enterprises vulnerable to zero-days?

ESET Research

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

Aryeh Goretsky13 Mar 2015


Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

Ransomware

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

Marc-Etienne M.Léveillé09 Mar 2015


Privacy

Fer O’Neil: Say What? Required contents of notice in data breach notifications

Fer O’Neil: Say What? Required contents of notice in data breach notifications

Privacy

Fer O’Neil: Say What? Required contents of notice in data breach notifications

With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?

Guest Author21 Feb 2015


Video

How to spot a Facebook hoax

How to spot a Facebook hoax

Video

How to spot a Facebook hoax

Hoaxes are all over Facebook so it's vital that you know what to look out for. Keep in mind these 5 top tips when scrolling through your news feed.

Kyle Ellison10 Feb 2015


Video

How to stay safe on social media – 5 top tips

How to stay safe on social media – 5 top tips

Video

How to stay safe on social media – 5 top tips

As social media becomes an increasingly large part of our everyday lives, It's easy to forget the dangers hiding behind our feeds. So, remember these five top tips next time you login to Facebook and Twitter.

Kyle Ellison09 Feb 2015