Blogs & Research
External blogs and research outlets covering Android security. For company profiles, see Threat Intelligence.
Malware Research
| Source |
Focus |
| CheckPoint Research |
Android malware campaigns, Play Store threats, mobile APT tracking. |
| Cleafy Labs |
Banking malware, financial fraud, mobile threat intelligence. |
| Cyble CRIL |
Dark web intelligence, mobile malware sold on underground forums. |
| Fortinet FortiGuard |
Android malware write-ups, mobile threat landscape. |
| IBM Security Trusteer |
Mobile banking fraud, overlay attack research, financial malware analysis. |
| Sophos X-Ops |
Cross-platform threat research including Android malware families. |
| ThreatFabric |
Android banking trojans. Most prolific mobile malware research team. |
| Trellix (FireEye) |
Advanced mobile threats, nation-state campaigns. |
Vulnerability Research
| Source |
Focus |
| 8kSec |
App and kernel-level Android security. Battlegrounds CTF. |
| Google Android Offensive Security |
Kernel exploitation, Binder fuzzing, driver analysis from Google's red team. |
| Google Project Zero |
0-day research. Android exploit chains, Pixel vulnerabilities. |
| NowSecure Blog |
Mobile app security testing, practical vulnerability analysis. |
| Oversecured Blog |
Android app vulnerabilities. Systematic disclosure in Google, Samsung, TikTok apps. Top resource. |
Vendor Security Blogs
| Source |
Focus |
| Avast Decoded |
Android malware, adware campaign analysis. |
| ESET WeLiveSecurity |
Android malware publications, regional threat analysis. |
| Group-IB Blog |
Threat intelligence, fraud prevention, APT campaigns. |
| Intel 471 Blog |
Underground marketplace monitoring, MaaS tracking. |
| Kaspersky Securelist |
Mobile malware analysis, APT campaigns targeting Android. |
| Lookout Threat Intelligence |
Mobile endpoint threats, surveillance software, state-sponsored spyware. |
| McAfee Mobile Research |
Mobile malware, adware, PUPs. Part of McAfee Labs. |
| NCC Group Research |
Offensive security research, Android malware lineage analysis. |
| PRODAFT Blog |
Threat intelligence, underground infrastructure analysis. |
| Trend Micro Blog |
Mobile ransomware, enterprise mobile threats. |
| Zimperium Blog |
Mobile threat defense research, zero-day discoveries. |