(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2216 articles

Stuxnet Analysis Update

Stuxnet Analysis Update

Stuxnet Analysis Update

Version 1.3 of the Stuxnet Analysis white paper is now available on the white papers page at http://www.eset.com/documentation/white-papers.

David Harley22 Dec 2010


Premium Phish

Premium Phish

Premium Phish

ESET Research20 Dec 2010


First, Catch Your Botnet

First, Catch Your Botnet

First, Catch Your Botnet

The paper presents an alternative approach to botnet research, employing “in the lab” experiments involving at-scale emulated botnets.

David Harley19 Dec 2010


Support Scams: Even More Personal

Support Scams: Even More Personal

Support Scams: Even More Personal

A recent report from Get Safe Online suggested that one in four people in the UK have received calls like this (based on a sample of 1500 adults), and my colleagues in Ireland tell me that their experience suggests comparable figures there.

David Harley16 Dec 2010


Opt Out isn’t Just for One Day

Opt Out isn’t Just for One Day

Opt Out isn’t Just for One Day

ESET Research15 Dec 2010


MS10-092 and Stuxnet

MS10-092 and Stuxnet

MS10-092 and Stuxnet

...among the 17 security bulletins just released by Microsoft on Patch Tuesday, MS10-092 addresses the Task Scheduler vulnerability prominently exploited by Win32/Stuxnet...

David Harley15 Dec 2010


Crouching Worm, Hidden Virus Writer, Rising Damp

Crouching Worm, Hidden Virus Writer, Rising Damp

Crouching Worm, Hidden Virus Writer, Rising Damp

...poachers turned gamekeeper are not uncommon in the security industry as a whole, and it's all too common for aspirant virus-writers whose notoriety is not necessarily matched by their technical skill to be hired by companies on the remote borders of malware detection and filtering, but the "real" AV industry goes out of its way to avoid hiring the ethically challenged....

David Harley15 Dec 2010


WWW - Web Weaponization and WikiLeaks

WWW - Web Weaponization and WikiLeaks

WWW - Web Weaponization and WikiLeaks

ESET Research11 Dec 2010


Is Barbie the Pedophile’s Best Friend?

Is Barbie the Pedophile’s Best Friend?

Is Barbie the Pedophile’s Best Friend?

ESET Research10 Dec 2010