Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft

Malicious APKs (Android Package Kit files) continue to serve as one of the most persistent and adaptable delivery mechanisms in mobile threat campaigns. Threat actors routinely exploit social engineering and off-market distribution to bypass conventional security controls and capitalize on user trust to steal a variety of data, such as log in credentials.

Hidden Geo-Risk: Why Most Mobile App Security Tools Fail Compliance

Most mobile security conversations start with code: vulnerabilities, misconfigurations, tokens, and flaws. But few discussions focus on a critical dimension—location: not where an app is used, but where its data travels. In modern mobile architectures, dozens of services operate behind the scenes. SDKs phone home. APIs call upstream. CDNs redirect without warning. Within this chaos, a single, silent connection to a sanctioned region can escalate into a compliance crisis.

The extended Q+A: continuing the AI agents conversation

Last week, we hosted the Product Spotlight: Build agents in Tines, and it was a hit. We had so many questions that we couldn’t answer them all live, so we’re continuing the conversation here. Before we jump into the Q+A, here’s a quick recap of the webinar in case you missed it: In this session, Head of Product Stephen O'Brien introduced the AI Agent action and shared how it builds on our ongoing evolution of workflows.

How to Rent a Server in the USA While Living in Ukraine: My Experience, Challenges, and Tips

When I first thought about renting a server in the USA while living in Ukraine, I believed it would be pretty simple: choose a hosting provider, pay, and start using it. But in reality, it turned out to be quite an adventure - full of losses, misunderstandings, and surprises related to exchange rates and support delays. Today, I want to share my personal experience so that maybe some of you can avoid the same mistakes.

Vanta Acquires Riskey to Transform Vendor Risk with Continuous, AI-Powered Monitoring

Vanta announces the acquisition of Riskey, a pioneer in real-time third- and fourth-party risk monitoring. The addition of Riskey's technology into Vanta Vendor Risk Management (VRM) significantly advances Vanta's capabilities in supporting security teams with an automated approach to VRM - replacing static point-in-time assessments with continuous, AI-driven risk intelligence.

The Attack On Browser-Based AI Agents Is Coming

We are working tirelessly on our AI First strategy to better protect both humans and their AI tools. KnowBe4 and its advocates spend a lot of time talking to audiences about AI-enabled threats, and rightly so, as recently covered in dozens of previous posts, including this recent one. This year and next promise to be an explosion of cyber threats better enabled by AI. After years of saying AI attacks would be coming, they are here and will be the way that most cybercrime is committed forevermore.