Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection

By Jordyn Alger, Managing Editor
Blurry face
Darius Bashar via Unsplash
May 5, 2026

Cybersecurity Researcher Jeremiah Fowler discovered a data exposure of what appears to be stalkerware leveraged to track a celebrity victim. The leaked database contained 86,859 images of which seemed to be screenshots from a user's device, related to one specific celebrity. 

What Happened? 

Fowler discovered the database in question was publicly accessible and without password protection, and it appeared to belong to an individual targeting one specific celebrity, a notable European entrepreneur/media personality. The screenshots capture communications with business associates, models, influencers, and celebrities; furthermore, intimate conversations and photos intended to be private were likewise captured. 

Highly sensitive information was exposed, including but not limited to:

  • Phone numbers
  • Emails 
  • Invoices
  • Receipts
  • Identifications

Fowler notified both the victim and law enforcement of the exposed database. 

What Executive Protection Professionals Need to Know 

While this particular instance deals with the privacy and safety of a celebrity, executives — especially those who may be considered “industry celebrities” — can be at risk of similar threatening behavior. 

Fowler spoke to Security magazine about the issue, saying, “Many executives and business professionals have to be available and accessible at all times and this means conducting business on a personal device such as their smartphone. If their device was compromised with spyware this could expose highly sensitive details about their digital lives and the business. This could range from things like mergers, investments, meeting or failing to meet revenue goals, intellectual property, or even real world physical risks to their safety. Criminals would have a clear understanding of who they are communicating with, what is being said, and this could have implications that go far beyond personal privacy violations. Having your personal life exposed could also increase the risk of extortion attempts or damage the reputation of an organization. While many companies invest in their internal cybersecurity it is also important to realize the potential threats to their leadership outside of the office through spyware on their personal devices.” 

What Is Stalkerware? 

Stalkerware is a form of spyware. It can be installed on a device (such as a phone or computer) and will monitor an individual without knowledge or consent.

Once installed, stalkerware could be used to: 

  • Follow a target’s location
  • Read messages 
  • Monitor social media 
  • Record phone calls 
  • View photos 

In some instances, spyware can activate cameras and microphones. 

How to Tell if Spyware Is on a Device

Stalkerware is designed to be subtle, but there are identifiable signs that the software may be infecting a device. These include: 

  • Battery drain
  • Abnormal system behavior 
  • High data usage
  • Unexpected pop-ups
  • Overheating 
  • Appearance of unfamiliar apps
  • Running slow 
  • Random restarts 
  • Unusual permissions requests 

Beyond signs on a device, security leaders can also pay attention to signals in the real world. For example, if an individual repeatedly arrives where your executive is without a explanation or reason, this could indicate the protected individual is being tracked. 

While this specific instance involved a European celebrity, security leaders all across the globe can consider it a reminder that executive protection has gone beyond physical and blurred into the digital world. 

KEYWORDS: data breach executive protection spyware stalking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Laptop and coffee in shade

    What the Medtronic Breach Means for Security Experts

    See More
  • Gears on keyboard

    What the LockBit Data Breach Reveals About Its Inner Workings

    See More
  • City in winter

    Grid Protection in Severe Weather: What Security Leaders Need to Know

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • April 8, 2026

    The Future of Executive Protection: Layering Technology, Intelligence, and Response

    ON DEMAND: Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep up with today’s threats.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing