Summary
iVerify needed investigative mobile threat research that tier-1 journalists would actually run. The ask: evidence-led work on live mobile threats, editorially rigorous enough to clear the Axios, Dark Reading, SecurityWeek, and CyberScoop editorial bar, at a cadence tight enough to build a category reputation.
Across 10 pieces (9 investigations and the standalone History of Stalkerware report) the programme earned 45+ documented media features across 20+ outlets including Axios, CyberScoop, Bleeping Computer, Dark Reading, SecurityWeek, The Hacker News, Infosecurity Magazine, CSO Online, SC Media, and GovInfoSecurity. ZeroDayRAT and Cellik each cleared 10+ features on their own.
Challenge
Mobile threat research is a narrow, skeptical category. Editors at Axios, Dark Reading, and SecurityWeek see a vendor byline land on their desks and assume the research is a marketing pose until proven otherwise. The work has to do the proving on its own terms: technical specificity, primary-source evidence, defensible methodology, and prose that reads as investigative rather than promotional.
iVerify also needed the research to travel. A blog post that sits on iverify.io and gets 200 views does not move the business; a blog post that gets lifted by Axios, CyberScoop, or Dark Reading does. That translation depends on writing for both the iVerify audience (security leaders, mobile defenders) and the journalist audience (editors looking for citable, factual material they can quote at length).
The third constraint was volume. One strong piece is an anecdote; ten is a programme. iVerify needed a cadence tight enough to build a reputation for consistent mobile threat coverage, not a one-off that reporters forget before the next news cycle.
Approach
We treated each piece as standalone investigative journalism that happened to live on a vendor blog. Original technical work (malware samples, cybercrime-network listings, capability analysis), sourcing disciplined enough to survive editor questions, and prose tight enough that Axios could lift a paragraph verbatim.
The writing register was calibrated for two readers at once: the mobile defender operating the platform, and the editor at a tier-1 outlet deciding whether to run the story. Short paragraphs, concrete evidence, primary sources named in-line, no marketing throat-clearing before the first substantive claim.
Specific investigations stacked by topic: Oblivion RAT, ZeroDayRAT, Cellik, HyperRat, FlexiSPY, GhostHook, and the SIM-swapping leaked-phone-number analysis each got dedicated technical breakdowns. "Abusing Data in the Middle" surfaced surveillance risks across 60+ mobile operators in 35 countries routing traffic through Chinese state-owned networks. Plus Renting Android Malware on the MaaS economy, and The History of Stalkerware as a standalone long-form report.
Results
10 pieces, 45+ documented media features, 20+ outlets picking up the work.
ZeroDayRAT earned 10+ features: Bleeping Computer, Dark Reading, SecurityWeek, The Hacker News, Infosecurity Magazine, CSO Online, CyberInsider, CyberPress, Ampcus Cyber, State of Surveillance, and others.
Cellik RAT earned 10+ features: Dark Reading, SecurityWeek, CyberInsider, SC Media, Android Headlines, CybersecurityNews.com, CyberPress, GBHackers, PCRisk, Zettawise, The Cyber Syrup.
"Abusing Data in the Middle" earned 7+ features: Axios, CyberScoop, GovInfoSecurity, Nextgov/FCW, CyberInsider, Security Info Watch, plus AP-style syndication into regional press.
HyperRat earned 6 features across Android Headlines, SC Media, Hackread, MalwareTips, Endure Network, and VOI. Oblivion RAT earned 4 features: CybersecurityNews.com, CyberPress, Cryptika, Zimperium. Renting Android Malware earned 4 features: SC Media, SiliconANGLE, Malware News, CybersecurityNews.com. GhostHook ran on SecurityOnline.info and Daily Dark Web.
Operationally, iVerify's marketing and comms teams can paste clean lines from the research into fast GTM threads: sales decks, analyst briefings, and inbound PR responses. The research library doubles as a living source-of-truth that the team can reach into without asking the writer to start from scratch.
![]()
"Daniel is extremely knowledgeable about the cybersecurity and threat landscape. His research is thorough, and his writing is publishing-ready."
We worked with Lisa across both SlashNext and iVerify.