Monday, April 14, 2025
HomeAndroidApp Defense Alliance - Google Partner with ESET, Lookout & Zimperium to...

App Defense Alliance – Google Partner with ESET, Lookout & Zimperium to Protect Android Users From Malicious Apps

Published on

SIEM as a Service

Follow Us on Google News

App Defense Alliance: Google tied up with mobile security companies to find bad apps before it reaches the user device. The primary goal of the alliance is to make Google play more secure.

They are more than 2.5 billion Android devices available worldwide, the popularity attracts the threat actors to develop sophisticated Android malware and upload them to Google Play.

App Defense Alliance

Google alliance with mobile security companies ESET, Lookout, and Zimperium to fight against malicious apps together, reducing the risk of app-based malware, identifying new threats, and protecting our users.

- Advertisement - Google News

The goal of the alliance is to ensure the safety of the Google play, quickly finding them and stop the app before it gets published.

“As part of this App Defense Alliance, we are integrating our Google Play Protect detection systems with each partner’s scanning engines. This will generate new app risk intelligence as apps are being queued to publish. Partners will analyze that dataset and act as another, a vital set of eyes before an app going live on the Play Store,” reads the blog post.

Google said that with this alliance “Multiple heuristic engines working in concert will increase our efficiency in identifying potentially harmful apps.”

“Partners of the App Defense Alliance can send a request to the Google Play Protect scanner service to have an app analyzed. The GPP scanner service then sends back the scan results directly to the partner. This direct communication also allows GPP to send requests to the partner’s scanner services and receive results from the partner’s scanning engines. “

The partners are picked by Google based upon their success in the detection of the threats and their detection to secure the community.

You can learn more details here about the App Defense Alliance here.

Also Read: Most Important Android Application Penetration Testing Checklist

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...