
ESET Annual Report 2024: Profit and revenue growth continues, R&D investment delivers strong returns
'While many speak of long-term vision and longevity, few live it. 2024 saw ESET's third consecutive decade of growth — a rare milestone in the technology sector, and one that reflects our progressive mindset, customer trust, and product excellence,' said Richard Marko, CEO of ESET. 'We saw particularly strong momentum in the EMEA region, where our cybersecurity solutions continue to gain traction. This was further reflected by strong performance within our B2B segment, where overall revenue grew by 13 per cent, Enterprise grew by 21 per cent and ESET Services experienced exceptional growth of 56 per cent. As threats evolve, so does our commitment to meeting our customers' need for innovation and resilience.'
R&D delivers immediate AI benefits for threat detection and response
In 2024, ESET's 847-member-strong technologists and Global Research and Development team worked to revamp ESET LiveGuard Advanced (ELGA), our proprietary cloud-based security module that uses behavioral analysis to prevent targeted attacks and new or unknown threats. This essential work also leveraged our latest developments in Artificial Intelligence (AI), advancing both scanning and filtering and further reducing ELGA's computing requirements in comparative tests.
Further development of ESET AI capabilities in 2024 saw us introduce ESET AI Advisor, which allows detection and response teams to leverage multi-agentic AI in incident response and risk analysis. This empowers organizations to fully capitalize on extended detection and response (XDR), taking care of threats before they have a chance to become full-scale security incidents. ESET AI Advisor has also been built into ESET Inspect, the company's XDR-enabling module of the ESET PROTECT Platform, which proved its worth during MITRE's 2024 Enterprise ATT&CK® Evaluations.
'Our long-term investment in research and development continues to benefit an increasing number of customers and make a profound impact,' said Richard Marko. 'Threat actors are making increased use of artificial intelligence and automated tooling; in turn, ESET's attention to, and investment in, AI have not only helped us counter those malicious forces, but have boosted revenue growth in 2024, in particular within the B2B segment.'
Threat research and threat intelligence, usability, and defense enhanced for business customers and service partners
ESET Research remains at the core of our efforts, informing not only the prevention-enhancing capabilities and R&D of our products (such as ESET Threat Intelligence), but also providing a better understanding of the threat landscape and empowering business and consumer security, globally.
ESET Research Highlights:
Among our many successes are the research pieces pursued by our award-winning Malware and Threat Research team. Of note are: The discovery of Operation Texonto, a Russian-aligned disinformation and PSYOPs operation targeting Ukrainian readers — including a Ukrainian defense provider and an EU agency
Identification of NGate malwarethat enables attackers to clone near-field communication data from victims' physical payment cards to target banking customers
Examination of the actions of the Russian-aligned GamaredonAPT group and GoldenJackal cyber espionage group that are operating in Ukraine and conducting attacks across Europe
Research publication on RedLine Stealer'sbackend modules as part of the joint investigation into the MaaS group's activities with Dutch police, the FBI, and Eurojust in late 2024.
'In 2024, ESET deepened relationships with several significant government customers and added new partnerships, particularly in the field of cyber threat intelligence. The dividends show as we continue to work closely with law enforcement partners, including Europol, ENISA, and CISA, to help defend businesses, individuals, and societies,' said Roman Kovac, Chief Research Officer at ESET.
A great dividend of research on our ongoing product development efforts in 2024 was the introduction of two managed detection and response (MDR) services — one for SMBs and one for enterprises — while also securing several strategic partnerships. This investment contributed to double-digit revenue growth in the SMB and MSP spaces, as well as in the Enterprise segment. This growth was also reflected by our sharpened strategies addressing the complex cybersecurity needs of large enterprises, critical infrastructure, and government institutions. This, too, can be seen in ESET Corporate Solutions' accelerated delivery of tailored solutions for high-stakes environments.
Among the developed or expanded partnerships in 2024 were:
Progress. Protected.
In 2024, ESET continued to redefine what is possible in cybersecurity through cutting-edge research and development. At the heart of this innovation is our deep commitment to AI and machine learning — powering smarter, faster, and more adaptive threat detection systems. Through continuous collaboration with academia and relentless in-house innovation, ESET ensures that our AI-powered solutions not only meet today's cybersecurity demands, but anticipate tomorrow's.
Moving forward, ESET's commitment to a cloud-first strategy, robust managed detection and response (MDR) capabilities, and AI-native prevention-first technologies remains central to its vision — ensuring resilience, adaptability, and leadership in an increasingly sophisticated threat landscape.
For further information about ESET's successes in 2024, please read the full 2024 ESET Annual Report here.
About ESET
ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it's endpoint, cloud or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Mid East Info
5 days ago
- Mid East Info
ESET joins Europol's Cyber Intelligence Extension Programme (CIEP) - Middle East Business News and Information
ESET, Europe's leading global cybersecurity company, is proud to announce its participation in the pilot phase of the Cyber Intelligence Extension Programme (CIEP), a new initiative launched by Europol's European Cybercrime Centre (EC3). The program aims to strengthen public-private cooperation in the fight against cybercrime by enabling real-time collaboration and intelligence sharing. As part of this initiative, ESET Chief Research Officer Roman Kováč, and Senior Malware Researcher Jakub Souček, recently spent several days at Europol headquarters in The Hague meeting EC3 teams and exploring ways in which ESET's threat intelligence can directly support investigations into ransomware operations, payment fraud schemes, or complex cybercrime infrastructure. Europol functions as a people hub, a data hub, and a case hub, a place where collaboration, intelligence, and operations converge. ESET's team met with law enforcement officers from multiple countries, experiencing firsthand how one central platform fosters effective cross-border cooperation. 'We believe the CIEP sets a new benchmark for actionable intelligence sharing, joint operational readiness, and collective impact,' says Roman Kováč, Chief Research Officer at ESET. ESET has a long history of collaboration with global law enforcement agencies, including in EC3's Advisory Group, where we are represented by ESET Senior Research Fellow Righard Zwienenberg. ESET has also contributed to successful law enforcement operations, including the takedowns of prominent threats such as Gamarue, RedLine, Grandoreiro, Lumma Stealer, and most recently, Danabot. The new CIEP initiative elevates this collaboration further, creating opportunities for direct, real-time engagement with Europol's operational teams. Public-private partnerships like this one are crucial in mitigating risks within today's rapidly evolving cyber threat landscape. ESET extends sincere gratitude to Marijn Schuurbiers, Head of Operations, Gonçalo Ribeiro, Head of Cyber Intelligence and architect of the CIEP program, and to all dedicated professionals at EC3 for their continued efforts in enhancing the fight against cybercrime across Europe and beyond. Cyber threats evolve rapidly, but through partnerships such as this, so does our collective defense. Together we can make Europe a safer place. About ESET ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it's endpoint, cloud or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit or follow our social media, podcasts and blogs.


Mid East Info
31-07-2025
- Mid East Info
The hidden risks of browser extensions – and how to stay safe - Middle East Business News and Information
Phil Muncaster, guest writer at ESET, explains that n ot all browser add-ons are handy helpers – some may contain far more than you have bargained for What would we do without the web browser? For most of us, it's our gateway to the digital world. But browsers are such a familiar tool today that we're in danger of giving them a free ride. In fact, there are plenty of rogue extensions masquerading as legitimate ad blockers, AI assistants, or even security tools that are designed to steal our data, send us to malicious sites and flood our screen with popups. For example, earlier this year, a malicious campaign was uncovered that may have impacted dozens of extensions and compromised nearly three million users. Next time you're thinking about downloading a web browser add-on, think through the following risks. Why extensions matter Browser extensions are an increasingly popular vehicle for threat actors. They give attackers access to a vast amount of sensitive information, with people often trusting these add-ons, especially if they're downloaded from official sources. Also, extensions provide multiple avenues for monetization and malicious activity and generally give attacks a better chance of success and are a threat also in corporate settings, where they may often stay under the radars of security teams and tools. However, by installing and granting an extension permissions, you could unwittingly be enabling malicious actors to access your most sensitive data – everything from browsing history to saved logins and session cookies, which could be abused to hijack your accounts. When browsers go bad A 2023 risk assessment of 300,000 browser extensions and third-party OAuth applications used in corporate environments revealed that half (51%) of the former were high risk and could potentially have caused 'extensive damage.' So how could they end up on your machine? Malware may be hidden in legitimate-looking browser extensions like those purporting to be ad blockers or PDF converters or even security enhancements. They could be packaged up and placed on browser stores for unwitting users to download, bundled with other software, shared through deceptive links or uploaded to platforms outside your official web store, where hackers rely on users 'sideloading' in order to target them. Sideloading is particularly dangerous because third-party stores don't feature the kind of security reviews and other checks that official marketplaces have in place. That means they're more likely to feature harmful add ons spoofed to appear as if legitimate. Alternatively, threat actors could hijack or acquire a legitimate extension and use it to send malicious updates to its entire user base. Sometimes, extensions can seem legitimate, but on activation will be programmed to install new payloads with malicious capabilities. What can malicious extensions do? The nefarious actions run the gamut and include: Stealing data, including usernames and passwords, browsing history, session cookies (which can be used to access your accounts without needing a password) and financial information. This may be sourced from your clipboard, browser or obtained via keylogging as you type it in. The end goal is usually to either sell that data on the dark web, or use it directly to hijack accounts and commit identity fraud. including usernames and passwords, browsing history, session cookies (which can be used to access your accounts without needing a password) and financial information. This may be sourced from your clipboard, browser or obtained via keylogging as you type it in. The end goal is usually to either sell that data on the dark web, or use it directly to hijack accounts and commit identity fraud. Directing you to malicious or risky websites that may harbor malware including infostealers and banking Trojans. Other sites may be spoofed to appear as if a legitimate brand, but are actually designed to harvest your personal and financial information and/or logins. that may harbor malware including infostealers and banking Trojans. Other sites may be spoofed to appear as if a legitimate brand, but are actually designed to harvest your personal and financial information and/or logins. Injecting unwanted ads and possible malware into your browsing experience. Ads could be monetized by threat actors, while malware may be designed to steal credentials or harvest other lucrative personal data for identity fraud. into your browsing experience. Ads could be monetized by threat actors, while malware may be designed to steal credentials or harvest other lucrative personal data for identity fraud. Backdooring your browser so that they can access your machine at any time in the future. so that they can access your machine at any time in the future. Mining for cryptocurrency without your knowledge, something that can slow down or even wear out your machine completely. Staying safe To mitigate these risks, caution is always advised when you're on the hunt for a new extension. First of all, stick to legitimate web stores and closely scrutinize any new add-on. That might include checking the developer's credentials, reading reviews of the product and searching separately for it to see if it has been connected to any suspicious or malicious behavior in the past. Look closely too at its permissions. If it requests any that seem to go beyond what is needed for the product, it should be a red flag. As is the case with, for example, mobile apps, not many extensions should need access to your passwords or browsing data. Additional tips to keep yourself safe include: Keep your browser updated so it's on the latest, more secure version at all times. This means it will be better protected against potential malware. Switch on multi-factor authentication on all your online accounts – that will go a long way toward keeping you safe even if a malicious browser extension does steal your passwords. To make your web browsing experience safer in general, consider using a secured browser mode that is offered together with other security-enhancing features by some security vendors. This mode comes in particularly handy when you perform financial and crypto transactions in your browser. Enhanced Safe Browsing in some common web browsers can also help you steer clear of malicious sites. Importantly, use security software from a reputable vendor, and perform periodic scans to check for anything suspicious running on your computer. It will go a long way towards preventing you downloading malware from third-party sites, or redirecting to a phishing site. Every piece of software we install, no matter how small, comes with an element of trust; indeed, this trust may be particularly significant with browser extensions, as they operate directly within your gateway to the internet. Think carefully about the value or convenience that an extension provides versus the potential risk. Ultimately, the goal is to make informed choices about the add-ons you allow into your digital space. be sure to source your browser extensions and, indeed, all other software from reliable providers.


Mid East Info
25-07-2025
- Mid East Info
ESET Research uncovers variants of AsyncRAT, popular choice of cybercriminals - Middle East Business News and Information
ESET Research is releasing its analysis of AsyncRAT — a remote access tool (RAT) designed to remotely monitor and control other devices. Over the years, AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of its variants and forks (customized and improved versions of the original tool). The published analysis provides an overview of the most relevant forks of AsyncRAT, drawing connections between them and showing how they have evolved. AsyncRAT, an open-source RAT, was released on GitHub in 2019 by a user going by the name of NYAN CAT. It offers a wide range of typical RAT functionalities, including keylogging, screen capturing, credential theft, and more. Its simplicity and open-source nature have made it a popular choice among cybercriminals, leading to its widespread use in various cyberattacks. 'AsyncRAT introduced significant improvements, particularly in its modular architecture and enhanced stealth features, making it more adaptable and harder to detect in modern threat environments. Its plug-in-based architecture and ease of modification have sparked the proliferation of many forks, pushing the boundaries even further,' says ESET researcher Nikola Knežević, author of the study. Ever since it was released to the public, AsyncRAT has spawned a multitude of new forks that have built upon its foundation. Some of these new versions have expanded on the original framework, incorporating additional features and enhancements, while others are essentially the same version in different clothes. The most popular variants for the attackers, according to ESET telemetry, are DcRat, VenomRAT, and SilverRAT. DcRat offers a notable improvement over AsyncRAT in terms of features and capabilities, while VenomRAT is packed with further additional features. However, not all RATs are serious in nature, and this applies equally to AsyncRAT forks. Clones like SantaRAT or BoratRAT are meant to be jokes. Despite this, ESET has found instances of real-world malicious usage of these in the wild. In its analysis, ESET Research has cherry-picked some lesser-known forks, too, as they enhance AsyncRAT's functionality beyond the features included in the default versions. These exotic forks are often the work of one person or group, and they make up less than 1% of the volume of AsyncRAT samples. 'The widespread availability of frameworks such as AsyncRAT significantly lowers the barrier to entry for aspiring cybercriminals, enabling even novices to deploy sophisticated malware with minimal effort. This development further accelerates the creation and customization of malicious tools. This evolution underscores the importance of proactive detection strategies and deeper behavioral analyses to effectively address emerging threats,' concludes Knežević. For a more detailed analysis and technical breakdown of various AsyncRAT variants and forks, check out the latest ESET Research blogpost, 'Unmasking AsyncRAT: Navigating the labyrinth of forks,' on Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research. About ESET ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it's endpoint, cloud or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit or follow our social media, podcasts and blogs.