Beyond Brushstrokes: Using AI to Spot Threats Others Can’t
Share
Commentary
Beyond Brushstrokes: Using AI to Spot Threats Others Can’t
April 25, 2025
Table of Contents
Imagine standing in an art gallery, staring at a famous impressionist painting like Monet’s “Water Lilies.” Up close, it’s just a collection of brushstrokes—abstract, chaotic, and unclear. But as you take a few steps back, the image suddenly comes into focus.
The chaos transforms into a serene pond, complete with water lilies gently floating across the surface. This technique is called “forced perspective,” relying on distance to reveal the full picture.
Cybersecurity can be compared to creating a masterpiece—every layer, method, and vector contributes to the final work of protection. Up close, security data can appear as a confusing blur of information—difficult to decipher and filled with noise. But with the right tools and investigative know-how, stepping back reveals patterns that expose threats hiding in plain sight.
AI Picassos and human curators
At Verimatrix, we’ve adopted a hybrid model to enhance our XTD product line—one that combines the predictive power of artificial intelligence (AI) with human expertise. Just as stepping back from an impressionist painting reveals the bigger picture, AI helps our security analysts detect threat patterns and anomalies that human eyes might overlook.
By leveraging statistical analysis, machine learning, and domain expertise, we uncover subtle irregularities in the datasets we collect to protect applications from attacks. For instance, XTD’s AI picked up an app instance that rapidly connected and disconnected—15 times in under a minute—from an IP address in a country not served by our customer.
Stepping back, those frantic connect-disconnect “pointillist dots” coalesced into a clear portrait of an automated credential-stuffing attack rather than random network noise. That bursty reconnect pattern is the hallmark of brute-force scripts running in cheap cloud regions. We alerted the customer, who then blocked the offending app from functioning on that device—neutralizing the attack without writing a single line of code.
How Verimatrix keeps pace with cybercriminals
In a recent conversation with Christopher (Chris) Spence, Senior Artificial Intelligence Engineer at Verimatrix, an important topic emerged: false positives. Too many false positives can overwhelm security teams, leading to “alert fatigue” that results in real threats getting overlooked. Chris emphasized the importance of constant monitoring and retraining of AI models, noting that AI systems, like human intuition, deteriorate over time if not continually updated.
“Detecting threats isn’t just about catching every anomaly,” Chris said. “It’s about catching the right ones.”
To combat this, Verimatrix employs a system that constantly monitors and recalibrates its AI models, ensuring that they maintain peak accuracy between 95% and 97%. This ongoing adjustment allows the models to catch new and evolving threats that would otherwise slip through the cracks and potentially cause harm.
Chris highlighted the challenge of data drift—the gradual deviation of real-world data from the original data sets that trained the AI. To stay ahead, Verimatrix uses an observability dashboard to track performance in real time and periodically retrain its AI. It’s the cybersecurity equivalent of adjusting your viewing angle to catch the hidden details of a masterpiece.
A game-changing discovery: Simi Studio
This hybrid model paid off in a way few could have anticipated. A few months ago, Verimatrix researchers uncovered malware lurking in the apps of Simi Studio, a developer with millions of downloads. Traditional antivirus scanners had classified these apps as “clean,” but Verimatrix’s AI flagged them as suspicious.
The AI picked up on patterns and anomalies that hinted at screen overlay attacks—a technique where the malware presents fake screens over legitimate apps to steal sensitive information. These apps were also attempting to escalate privileges, requesting root access to devices, which is a major red flag for potential malicious behavior.
Thanks to the AI’s ability to process millions of data points instantaneously, Verimatrix caught what human analysts might have missed, highlighting the power of its hybrid AI-human approach.
The Simi Studio case underscores the power of AI-driven pattern recognition in mobile app defense. By processing enormous amounts of data in near real-time, AI can detect the subtle signs of potential attacks, like deviations in app behavior or suspicious network activity.
However, it’s not just about catching everything—it’s about refining those insights, which is where the human element comes in. That’s why Verimatrix’s threat monitoring team doesn’t rely solely on machines.
They use human intuition and expertise to provide a feedback loop for the AI models, fine-tuning them based on real-world results. This combination minimizes false positives and improves the system’s overall accuracy. AI identifies the potential threats, and humans validate the findings, adding a layer of insight that machines alone can’t achieve.
Handling complex threats in real time
Verimatrix’s Extended Threat Defense (XTD) platform goes even further. It uses ensemble machine learning algorithms to detect multi-stage attack patterns, correlating different stages of an attack to predict potential outcomes. This allows the system to proactively respond to attacks like payload delivery, repackaging efforts, and screen overlay exploits—all in real time.
This proactive approach is critical in defending against zero-day attacks, which exploit previously unknown vulnerabilities. Verimatrix’s system doesn’t just react to known threats—it predicts new ones before they can do damage. It’s the equivalent of not only appreciating a painting for its beauty but understanding the intent behind every brushstroke.
Why Verimatrix's hybrid approach is the future of mobile app defense
The points of view shared by Chris highlight the continuous evolution of mobile threat detection. The integration of automated AI retraining, human oversight, and advanced ML algorithms gives Verimatrix a distinct edge in the battle against cybercriminals.
For businesses that rely on mobile apps, Verimatrix’s hybrid approach means staying ahead of cybercriminals who are constantly changing their tactics.
While other companies struggle with the overwhelming volume of alerts and false positives, Verimatrix offers a smarter, more effective solution. By combining AI’s ability to process massive datasets with human intuition, Verimatrix sets a new standard in threat detection.
The future of mobile defense is hybrid threat intelligence
With app attacks becoming more sophisticated and frequent, Verimatrix’s AI-driven XTD solution offers enterprises an unparalleled level of protection. The company’s focus on reducing false positives and leveraging human expertise alongside machine learning ensures that security teams can focus on what really matters—keeping mobile applications safe from even the most sophisticated attacks.
Just as forced perspective helps us see the bigger picture from the right angle, Verimatrix’s hybrid threat intelligence approach helps businesses see and address threats that would otherwise remain hidden. The future of cybersecurity isn’t just about machines or humans—it’s about both.
Want to see it in action?
Request a demo of Verimatrix XTD! Contact us to learn how hybrid threat detection can elevate your mobile defense.
Stay informed and secure
Get the latest insights on emerging cyber threats and in-app security measures to protect your mobile apps. Stay one step ahead of hackers by signing up for our newsletter now!
Written by
Jon Samsel
Head of Cybersecurity Business and Global Marketing
Commentary
Beyond Brushstrokes: Using AI to Spot Threats Others Can’t
Table of Contents
Imagine standing in an art gallery, staring at a famous impressionist painting like Monet’s “Water Lilies.” Up close, it’s just a collection of brushstrokes—abstract, chaotic, and unclear. But as you take a few steps back, the image suddenly comes into focus.
The chaos transforms into a serene pond, complete with water lilies gently floating across the surface. This technique is called “forced perspective,” relying on distance to reveal the full picture.
Cybersecurity can be compared to creating a masterpiece—every layer, method, and vector contributes to the final work of protection. Up close, security data can appear as a confusing blur of information—difficult to decipher and filled with noise. But with the right tools and investigative know-how, stepping back reveals patterns that expose threats hiding in plain sight.
AI Picassos and human curators
At Verimatrix, we’ve adopted a hybrid model to enhance our XTD product line—one that combines the predictive power of artificial intelligence (AI) with human expertise. Just as stepping back from an impressionist painting reveals the bigger picture, AI helps our security analysts detect threat patterns and anomalies that human eyes might overlook.
By leveraging statistical analysis, machine learning, and domain expertise, we uncover subtle irregularities in the datasets we collect to protect applications from attacks. For instance, XTD’s AI picked up an app instance that rapidly connected and disconnected—15 times in under a minute—from an IP address in a country not served by our customer.
Stepping back, those frantic connect-disconnect “pointillist dots” coalesced into a clear portrait of an automated credential-stuffing attack rather than random network noise. That bursty reconnect pattern is the hallmark of brute-force scripts running in cheap cloud regions. We alerted the customer, who then blocked the offending app from functioning on that device—neutralizing the attack without writing a single line of code.
How Verimatrix keeps pace with cybercriminals
In a recent conversation with Christopher (Chris) Spence, Senior Artificial Intelligence Engineer at Verimatrix, an important topic emerged: false positives. Too many false positives can overwhelm security teams, leading to “alert fatigue” that results in real threats getting overlooked. Chris emphasized the importance of constant monitoring and retraining of AI models, noting that AI systems, like human intuition, deteriorate over time if not continually updated.
“Detecting threats isn’t just about catching every anomaly,” Chris said. “It’s about catching the right ones.”
To combat this, Verimatrix employs a system that constantly monitors and recalibrates its AI models, ensuring that they maintain peak accuracy between 95% and 97%. This ongoing adjustment allows the models to catch new and evolving threats that would otherwise slip through the cracks and potentially cause harm.
Chris highlighted the challenge of data drift—the gradual deviation of real-world data from the original data sets that trained the AI. To stay ahead, Verimatrix uses an observability dashboard to track performance in real time and periodically retrain its AI. It’s the cybersecurity equivalent of adjusting your viewing angle to catch the hidden details of a masterpiece.
A game-changing discovery: Simi Studio
This hybrid model paid off in a way few could have anticipated. A few months ago, Verimatrix researchers uncovered malware lurking in the apps of Simi Studio, a developer with millions of downloads. Traditional antivirus scanners had classified these apps as “clean,” but Verimatrix’s AI flagged them as suspicious.
The AI picked up on patterns and anomalies that hinted at screen overlay attacks—a technique where the malware presents fake screens over legitimate apps to steal sensitive information. These apps were also attempting to escalate privileges, requesting root access to devices, which is a major red flag for potential malicious behavior.
Thanks to the AI’s ability to process millions of data points instantaneously, Verimatrix caught what human analysts might have missed, highlighting the power of its hybrid AI-human approach.
The Simi Studio case underscores the power of AI-driven pattern recognition in mobile app defense. By processing enormous amounts of data in near real-time, AI can detect the subtle signs of potential attacks, like deviations in app behavior or suspicious network activity.
However, it’s not just about catching everything—it’s about refining those insights, which is where the human element comes in. That’s why Verimatrix’s threat monitoring team doesn’t rely solely on machines.
They use human intuition and expertise to provide a feedback loop for the AI models, fine-tuning them based on real-world results. This combination minimizes false positives and improves the system’s overall accuracy. AI identifies the potential threats, and humans validate the findings, adding a layer of insight that machines alone can’t achieve.
Handling complex threats in real time
Verimatrix’s Extended Threat Defense (XTD) platform goes even further. It uses ensemble machine learning algorithms to detect multi-stage attack patterns, correlating different stages of an attack to predict potential outcomes. This allows the system to proactively respond to attacks like payload delivery, repackaging efforts, and screen overlay exploits—all in real time.
This proactive approach is critical in defending against zero-day attacks, which exploit previously unknown vulnerabilities. Verimatrix’s system doesn’t just react to known threats—it predicts new ones before they can do damage. It’s the equivalent of not only appreciating a painting for its beauty but understanding the intent behind every brushstroke.
Why Verimatrix's hybrid approach is the future of mobile app defense
The points of view shared by Chris highlight the continuous evolution of mobile threat detection. The integration of automated AI retraining, human oversight, and advanced ML algorithms gives Verimatrix a distinct edge in the battle against cybercriminals.
For businesses that rely on mobile apps, Verimatrix’s hybrid approach means staying ahead of cybercriminals who are constantly changing their tactics.
While other companies struggle with the overwhelming volume of alerts and false positives, Verimatrix offers a smarter, more effective solution. By combining AI’s ability to process massive datasets with human intuition, Verimatrix sets a new standard in threat detection.
The future of mobile defense is hybrid threat intelligence
With app attacks becoming more sophisticated and frequent, Verimatrix’s AI-driven XTD solution offers enterprises an unparalleled level of protection. The company’s focus on reducing false positives and leveraging human expertise alongside machine learning ensures that security teams can focus on what really matters—keeping mobile applications safe from even the most sophisticated attacks.
Just as forced perspective helps us see the bigger picture from the right angle, Verimatrix’s hybrid threat intelligence approach helps businesses see and address threats that would otherwise remain hidden. The future of cybersecurity isn’t just about machines or humans—it’s about both.
Want to see it in action?
Request a demo of Verimatrix XTD! Contact us to learn how hybrid threat detection can elevate your mobile defense.
Stay informed and secure
Written by
Jon Samsel
Head of Cybersecurity Business and Global Marketing
Share this cybersecurity insight
Other cybersecurity insights
Cybersecurity Threat Roundup #22: Copybara, Crocodilus, Lucid, and more
SparkKitty: A Silent Threat in ‘Trusted’ Apps
WestJet Breach Shows Why Downtime Is a Business Killer
Darcula’s Digital Playbook: The Global Scam That’s Redefining Mobile Threats