(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Video

Should I worry about my connected devices?

Should I worry about my connected devices?

Video

Should I worry about my connected devices?

There could be many benefits of having a connected household, but connecting your appliances to the internet could also put them at risk of being hacked. We provide some useful tips to make sure all of your connected devices are protected.

Editor02 Oct 2014


Bootkits, Windigo, and Virus Bulletin

Bootkits, Windigo, and Virus Bulletin

Bootkits, Windigo, and Virus Bulletin

ESET research on Operation Windigo received an award at Virus Bulletin 2014. Our research on bootkits was also well received, and is now available publicly.

David Harley30 Sep 2014


How To

How to fix Shellshock Bash on Mac OS X: Mavericks edition

How to fix Shellshock Bash on Mac OS X: Mavericks edition

How To

How to fix Shellshock Bash on Mac OS X: Mavericks edition

Apple Mac OS X users concerned about the Bash vulnerability dubbed Shellshock got some relief late yesterday as Apple published fixes for various versions of OS X. But if you use Mavericks you will need to install 10.9.5 before the Bash fix will work.

Stephen Cobb30 Sep 2014


How to resolve Shellshock on Mac OS X, web servers and more

How to resolve Shellshock on Mac OS X, web servers and more

How to resolve Shellshock on Mac OS X, web servers and more

The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patched to prevent abuse by malicious persons. Here's advice about what to do and links to more in-depth resources.

Stephen Cobb25 Sep 2014


Malware

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

Malware

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

Robert Lipovsky22 Sep 2014


Virus Bulletin presentations update

Virus Bulletin presentations update

Virus Bulletin presentations update

Updated information on ESET presentations at Virus Bulletin 2014.

David Harley22 Sep 2014


Video

How to make your social media accounts (almost) unhackable

How to make your social media accounts (almost) unhackable

Video

How to make your social media accounts (almost) unhackable

Now more than ever, its important to make sure your social media accounts are safe and secure. Here are our 6 top tips to make your social media accounts almost unhackable.

Editor18 Sep 2014


Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Virus Bulletin, AVAR conferences: a tasty Conference Pair*

Autumn: the season of mists and mellow fruitfulness, not to mention a couple of excellent security conferences. Virus Bulletin and AVAR make a very tasty Conference Pair.

David Harley10 Sep 2014


Video

VPN for beginners

VPN for beginners

Video

VPN for beginners

Virtual private networks use a public network, usually the internet, to connect remote users together. This video aims to give you a better understanding of the concept, helping you choose the right VPN for your needs.

Editor05 Sep 2014