Upwardly Mobile - API & App Security News

Skye MacIntyre

Think the App Store’s built-in security is enough? Think again. Welcome to Upwardly Mobile, the podcast that exposes the gaps in iOS, Android, and HarmonyOS security. Hosts Skye and George take you into the high-stakes world of mobile defense, revealing why standard protections from Apple, Google, and Samsung often leave your sensitive data exposed. Sponsored by Approov—the gold standard in mobile app attestation—we move beyond the basics to tackle weaponized AI threats and dynamic API attacks. From runtime attestation to navigating complex compliance regulations, we equip developers and security pros with the actionable strategies needed to thwart attackers. Don’t leave your app vulnerable. Subscribe now on Spotify and Apple Podcasts to elevate your security game. This show includes AI-generated content.

  1. MAY 1

    Leveling the Playing Field - Human vs. Betting Bots

    Episode Summary In this episode of Upwardly Mobile, we dive into the high-stakes world of sports betting and prediction markets like Polymarket, where millions of dollars move in mere seconds. Human bettors are increasingly finding themselves outmatched—not by sharper sports fans, but by high-frequency trading (HFT) bots and AI agents. We explore how "cheating" in mobile betting has rapidly evolved from simple "bonus bagging" and multi-accounting to complex API impersonation, where AI scrapes odds across 50 books simultaneously. Discover why AI-driven solvers have rendered CAPTCHAs useless, and learn about the "Human Tax"—the invisible cost human bettors pay when bots clean out the best lines and force them to accept worse odds. Finally, we discuss how a "Positive Security Model" ensures that only genuine, official mobile apps can place a bet, protecting the integrity of the game. Key Data Points Discussed The Arbitrage Gap: Arbitrage windows on prediction markets have collapsed from 12+ seconds to sub-100ms latencies.The $40M Loss: A study of Polymarket revealed that "botted" bettors secured over $40 million in risk-free profits by exploiting price lags humans couldn't see.Bot Dominance: In high-volume markets, automated trading accounts for over 70% of the volume, leaving humans at a severe disadvantage.Compliance Failures: Over 4,800 underage registration attempts were flagged by major sportsbooks in 2025, many of which were likely automated scripts attempting to scale multi-accounting operations.Sponsor This episode is brought to you by Approov. Ensure your platform operates on a Positive Security Model by cryptographically attesting that only your genuine mobile app is accessing your APIs. Learn how Approov addresses the security trust gap at approov.com. Source Materials & Further Reading (Note: As specific URLs were not provided in the source notes, please search these titles to read the full reports): GamblingNews: Botted Bettors Earn $40M Exploiting PolymarketCleanSky: Why Copying Polymarket Whales Will Lose You MoneyApproov Whitepaper: How Approov Addresses the Security Trust GapQuantVPS: Sports Betting Bots on PolymarketKeywords: Sports betting bots, Polymarket exploits, API impersonation, high-frequency trading (HFT) betting, prediction market bots, Positive Security Model, mobile API security, multi-accounting scripts, the Human Tax, arbitrage gaps, cryptograph attestation, mobile app security.    🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    23 min
  2. APR 28

    Android 17 | Securing the Future: AI Agents, API Risks & Advanced Protection

    Welcome to another episode of Upwardly Mobile, your ultimate guide to defending mobile apps in today’s volatile digital landscape. In this episode, hosts Skye and George unpack the high-stakes security implications of Android 17. As smartphones evolve from passive tools to autonomous "agentic" devices powered by on-device AI and AppFunctions, the attack surface for mobile APIs is expanding dramatically. We explore the critical security trade-offs of these new features, including the rising threats of prompt injection, cross-app data leakage, and the massive "blast radius" if AI agents are tricked into executing unintended actions using legitimate permissions. We also break down Google's latest platform hardening measures, specifically how the Advanced Protection Mode (AAPM) will now block non-accessibility apps from abusing the AccessibilityService API to prevent malware and credential theft. Whether you are an iOS, Android, or HarmonyOS developer, learn how to adapt to these secure-by-default changes and implement a "trust chain" by securing your exposed AI surface area with robust API attestation. Sponsor: This episode is proudly sponsored by Approov Mobile Security, the gold standard in zero-trust mobile app attestation and API security. Approov extends platform security by verifying real apps, preventing bot abuse, and eliminating hard-coded secrets to stop API abuse at the source. Visit approov.com to secure your APIs against ever-advancing cyber threats. Key Topics Discussed: The Rise of Agentic Phones: How Android 17 shifts intelligence directly to the device with Gemini-powered "Magic Actions" and cross-app workflows.AI Agent Risks: The dangers of direct and indirect prompt injection, malicious plugins, and lateral movement across systems.Locking Down the Accessibility API: How Android 17's Advanced Protection Mode enforces stronger least-privilege access by exempting only verified accessibility tools (using the isAccessibilityTool="true" flag) to prevent screen monitoring and automated malware.Platform Hardening for Developers: Essential updates you need to know, including tighter background activity launch (BAL) rules, safer dynamic code loading (DCL) for native libraries, and mandatory local network permission declarations.Defensive Strategies: Why developers must scope AI actions narrowly, separate "read" from "act" permissions, and require explicit user consent for high-risk workflows.Resources & Source Materials: Android 17: Your Phone's AI is Evolving to be More Autonomous – By Joyce Kuo, Approov Mobile SecurityAndroid 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse – The Hacker News / CyberyamiBehavior changes: Apps targeting Android 17 or higher – Android Developers Official DocumentationSEO Keywords: Android 17 security, mobile app development, API security, AI agents, Gemini AI risks, prompt injection, Advanced Protection Mode, Accessibility API malware, mobile cybersecurity, AppFunctions, app attestation, zero-trust mobile.        🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    20 min
  3. MAR 30

    The Age of Agentic AI: Securing Mobile APIs Against Bots with Brains

    Episode Summary: Welcome back to "Upwardly Mobile"! In this episode, we dive deep into the rapidly evolving mobile threat landscape defined by the rise of "Agentic AI." With Android 17 set to transform our smartphones into active, on-device AI orchestrators by Summer 2026, the security stakes have never been higher. We unpack the alarming findings from the 2026 Cloudflare Threat Report, which highlights the total industrialization of cyber threats and how attackers are using AI as a massive force multiplier. We also explore why legacy bot defenses—like rate limiting, CAPTCHAs, and behavioral biometrics—are completely failing against modern AI bots that can dynamically rewrite code and mimic human behavior with 99% accuracy. Finally, we discuss how the integration of Cloudflare's edge network with Approov's deterministic device attestation is providing the ultimate defense-in-depth architecture to stop mobile API abuse at the source. If you are attending the RSA Conference (RSAC) in San Francisco this March 2026, be sure to catch up with our sponsors at Approov to learn how to future-proof your mobile architecture! Key Takeaways: The Android 17 Revolution: Android 17 shifts the OS from a reactive tool to an active "agent phone" that orchestrates multi-step workflows across apps. While this brings massive benefits in speed and privacy, it also dramatically expands the attack surface for prompt injections and cross-app data leakage.The Industrialization of Cyber Threats: The 2026 Cloudflare Threat Report reveals that AI has lowered the barrier to entry for highly effective cyber operations, moving the industry toward automated, machine-speed exploits.The Death of Legacy Bot Defenses: Legacy probabilistic defenses like WAFs and CAPTCHAs are failing because multimodal LLM agents can now solve logic puzzles and mimic human "thumb jitter" perfectly.Cryptographic Proof of Life: To stop agentic AI, security must shift from asking "Is this a bot?" to demanding deterministic, cryptographic proof of the device and app's integrity.A New Defense-in-Depth: Combining Cloudflare's global edge network with Approov's deep runtime analysis and "Zero Secrets" architecture ensures that only untampered, legitimate app instances can access your APIs.Sponsor Links: Secure your Mobile APIs today: Visit approov.com to learn how to eliminate hardcoded secrets and implement deterministic device attestation.Source Materials & Further Reading: Android 17: Android Is Becoming an Agent - Are you ready?2026 Cloudflare Threat Report: How adversaries are weaponizing the InternetWhen the Bot Has a Brain: Defending Mobile APIs in the Era of Agentic Attackers (Approov RSAC 2026 Presentation)See You at RSA 2026: Let's Talk Stopping Mobile API Abuse at the SourceKeywords for SEO: Agentic AI, Mobile API Security, Android 17, Cloudflare Threat Report 2026, Approov, Bot Mitigation, RSA Conference 2026, Cybersecurity, Device Attestation, Zero Secrets Architecture, AI Bots, Malware Defense, Prompt Injection, API Abuse.         🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    22 min
  4. MAR 12

    Epic Victory: Google Play's Walled Garden Opens Up & What It Means for Developers

    Epic Victory: Google Play's Walled Garden Opens Up & What It Means for Developers Episode Summary: In this episode of Upwardly Mobile, we dive deep into the landmark antitrust settlement between Epic Games and Google that is set to fundamentally reshape the Android app ecosystem globally. After years of legal battles sparked by Epic's "Project Liberty" and the removal of Fortnite from the Play Store, a jury found Google guilty of maintaining an illegal monopoly. We break down the newly announced March 2026 settlement, which significantly drops Play Store commission fees and introduces a game-changing "Registered App Stores" program. What does this mean for mobile developers, app revenue, and Android security? Tune in to find out! Brought to you by Approov: As Android opens its doors to third-party "Registered App Stores" and frictionless sideloading, ensuring your mobile app and APIs are protected from malicious clones and tampering is more critical than ever. Secure your mobile business and authenticate your apps natively with Approov. Key Topics Discussed: The Origins of the Lawsuit: How Epic Games' Tim Sweeney bypassed Google's standard 30% fee by allowing direct purchases in Fortnite, leading to the game's removal and a massive antitrust lawsuit.The Courtroom Battle: The revealing internal practices uncovered during the trial, including Google's "Project Hug" and millions of dollars spent to prevent developers from abandoning the Play Store.The 2026 Settlement Details: How Google is dropping its standard Play Store commission to 20% for in-app purchases and 10% for recurring subscriptions.Registered App Stores Program: A deep dive into Google's new framework that allows alternative Android app stores (like the Epic Games Store) to become "first-class citizens" on Android devices, removing the scary, "doom-laden" security pop-ups previously associated with sideloading.Global Rollout Timeline: When these major fee changes and developer programs will go live, starting in the US, UK, and European Economic Area in June 2026, and expanding globally by September 2027.Source Materials & Further Reading: TechCrunch: Google settles with Epic Games, drops its Play Store commissions to 20%Wikipedia: Epic Games v. GoogleTargeted SEO Keywords: Epic Games vs Google, Google Play Store settlement, Android app ecosystem, Registered App Stores program, mobile app development, third-party app stores, sideloading Android apps, app store commission fees, Tim Sweeney, Fortnite Android return, mobile app security, API protection.  🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    15 min
  5. MAR 8

    Unpacking the Spotify Exploits: Credential Stuffing, Fake Streams, and Mobile App Security

    Unpacking the Spotify Exploits: Credential Stuffing, Fake Streams, and Mobile App Security Episode Summary: In this episode of Upwardly Mobile, we dive deep into the digital exploitation landscape of one of the world's largest audio streaming platforms. We break down the massive credential stuffing attack that compromised 350,000 Spotify users, exposing the dangers of poor password hygiene and unsecured databases. We also explore the ongoing controversies surrounding Spotify, including lawsuits over artificial streaming, bot farms, and the platform's "Discovery Mode". Additionally, we highlight a growing trend where malicious actors are weaponizing Spotify's search features to promote pirated software, phishing schemes, and malware. Finally, we pivot to actionable solutions for developers, exploring how Zero Trust Runtime Protection and App Attestation can prevent automated mobile attacks. Brought to you by Approov: Don't let bots, scripts, or fake apps compromise your platform. Learn how to stop credential stuffing and secure your APIs at approov.com. Sponsor Spotlight: Approov Mobile Security Are your mobile apps and APIs safe from automated credential stuffing, emulators, and Man-in-the-Middle (MitM) attacks? Approov ensures that only genuine mobile app instances running in safe environments can access your APIs, blocking scripts, modified apps, and bots in real-time. 👉 Secure your mobile platforms today at approov.com. Source Materials & Further Reading: 350,000 Spotify users hacked in credential stuffing attack | IT ProSpotify Finds Itself At The Centre Of Payola And Fake Stream Storm | Noise11.comSpotify misused for scams and malware | Digital Watch ObservatoryStrategies to Stop Credential Stuffing Attacks on Mobile Apps | ApproovKeywords: Credential stuffing, mobile app security, Spotify hack, artificial streaming, bot farms, zero trust runtime protection, API security, mobile malware, phishing schemes, app attestation, Approov.  🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    22 min
  6. FEB 28

    Securing Mobile Healthcare | The Hidden Dangers in Mental Health Apps

    Episode Summary: In this episode of Upwardly Mobile, we dive deep into a shocking new cybersecurity report revealing that millions of users' highly sensitive medical data may be at risk. We discuss the recent discovery of 1,500 vulnerabilities across 10 incredibly popular mental health apps—which have been downloaded over 14 million times. From leaked therapy transcripts and mood logs to the high black-market value of these stolen health records, we unpack the unique risks threatening the digital healthcare space today. Finally, we explore actionable solutions for healthcare providers and developers to lock down their platforms, featuring insights on Runtime Application Self-Protection (RASP), dynamic certificate pinning, and end-to-end API security. Key Topics Discussed in This Episode: The Mental Health App Crisis: How researchers at Oversecured uncovered 54 high-severity flaws in leading mental health applications, leaving sensitive data like Cognitive Behavioral Therapy (CBT) session notes and medication schedules exposed.The Black Market for Health Data: Why cybercriminals are targeting therapy records, which can sell for upwards of $1,000 each—far more than stolen credit card numbers.Common Developer Pitfalls: The dangers of outdated apps, plaintext configuration data, hardcoded Firebase URLs, and insecure encryption keys.Securing Mobile Health: How technologies like Runtime Application Self-Protection (RASP) and dynamic certificate pinning can prevent Man-in-the-Middle (MitM) attacks, block bots, and ensure HIPAA and GDPR compliance.Sponsor: This episode is brought to you by Approov. Approov provides complete, end-to-end protection for mobile health apps and APIs. Their lightweight SDK and RASP technology can be deployed in just a single sprint to block bot attacks, prevent credential stuffing, and stop API abuse. Ensure your patients' health data is safe, even on jailbroken devices or insecure Wi-Fi networks. Learn how to protect your revenue and patient trust at approov.com. Resources & Source Materials: TechRadar Report: Multiple mental health apps riddled with high severity security flaws — data of millions put at risk, so be on your guardApproov Mobile Health Security: Ensure Security and Trust for Healthcare AppsSEO Keywords: Mobile app security, mental health apps, healthcare data breach, API security, mobile health compliance, HIPAA compliance mobile apps, RASP technology, cybersecurity podcast, Oversecured vulnerabilities, patient data protection, Approov mobile security.        🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    24 min
  7. FEB 23

    The Triangle of Trust: Mastering Mobile App Attestation & Zero Trust API Security

    Welcome to another episode of Upwardly Mobile! In this episode, we take a deep dive into the evolution of runtime security for mobile API access. Traditional methods like API keys are easily stolen because they are static and stored directly inside the user's app. To combat this vulnerability, we explore the groundbreaking "Triangle of Trust" architecture developed by CriticalBlue, the company behind the Approov mobile security service. We unpack the technical details of US Patent 11,163,858 B2, titled "Client Software Attestation," which establishes a Zero Trust proof of software integrity for apps operating on the public internet. This episode breaks down how the patented system calculates a cryptographic hash fingerprint of an executing code image to detect tampering in real-time, ensuring that malicious actors cannot spoof access. We also discuss how Approov's platform-agnostic approach provides a significant competitive advantage over OS-native solutions like Google Play Integrity and Apple App Attest, especially in global markets featuring Huawei's HarmonyOS NEXT and non-GMS Android devices. Key Takeaways from this Episode:The Triangle of Trust: A tripartite architecture separating the security check from the access itself, involving an Issuer (Approov Cloud Attestation Server), a Holder (the Mobile Client Device), and a Verifier (the Backend Server Device).Dynamic Code Fingerprinting: How client applications calculate a cryptographic hash of their own executing code image to prove integrity, ensuring no sensitive "master keys" are ever stored on the device where they could be extracted.Protection Against Advanced Threats: The system's ability to thwart "living-off-the-land" attacks (like memory hooking with Frida) and Man-in-the-Middle (MITM) attacks by verifying code dynamically in memory, rather than just checking the static OS state.Superiority Over OS-Native Tools: Why a unified, cross-platform attestation approach is critical for the global market, bypassing the latency, platform restrictions, and hardware dependencies of Google Play Integrity and Apple App Attest.A Defensible Security Moat: An analysis of why CriticalBlue's patent is highly defensible and has been cited over 60 times as prior art, acting as a major technical blocker for competitors in the cybersecurity industry.Sponsor: This episode is brought to you by Approov. Stop relying on static API keys and secure your mobile business with deterministic, zero-trust software integrity. With global reach across iOS, GMS Android, non-GMS Android, and HarmonyOS, Approov ensures your backend APIs are shielded from malicious bots and tampered apps. Visit approov.com to learn more and secure your mobile ecosystem today. Source Materials & Relevant Links:US Patent 11,163,858 B2: Client Software Attestation by Richard Michael Taylor / Critical Blue Ltd. (Filed 2015, Granted Nov 2, 2021).Whitepaper Excerpt: Attestation: The Triangle of Trust.Approov Official Website: approov.comSEO Keywords: Mobile API security, Zero Trust architecture, App attestation, Approov, CriticalBlue, Cryptographic hash fingerprint, Google Play Integrity alternative, Apple App Attest alternative, Man-in-the-Middle protection, US Patent 11163858, Mobile app tampering, Cybersecurity podcast.  🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    21 min
  8. The "Rootless" Revolution: Inside the Dopamine Jailbreak & The EBT Security Crisis

    FEB 6

    The "Rootless" Revolution: Inside the Dopamine Jailbreak & The EBT Security Crisis

    The "Rootless" Revolution: Inside the Dopamine Jailbreak & The EBT Security Crisis 🎧 Episode Summary In this episode of Upwardly Mobile, we dive into two critical stories reshaping the mobile security landscape. First, we unpack the architecture of Dopamine, the modern "rootless" jailbreak that has cracked iOS 15 and iOS 16 without touching the system partition. We explore how it bypasses Apple’s Signed System Volume (SSV) and what this means for app developers trying to detect compromised devices. Then, we shift gears to a systemic failure in government fintech: why the "Lock Card" feature in EBT mobile apps is failing to stop fraud. We break down how attackers are bypassing mobile controls using legacy magstripe rails and bot attacks. 🚀 Key Topics Discussed The Dopamine Architecture: Understanding the shift from "rootful" to "rootless" jailbreaking.How it Works: The exploit chain, including PAC and PPL bypasses, and the creation of the fake root environment in /var/jb.Detection Challenges: Why traditional jailbreak detection methods struggle against rootless environments and the reliance on finding tweak injection libraries like ElleKit.The EBT Mobile Failure: Why locking your EBT card in the mobile app doesn't actually stop thieves at the register.API Abuse: How botnets are hammering IVR and app APIs to time their theft perfectly.🔗 Resources & Links Dopamine Jailbreak: Official Project: Dopamine GitHub (opa334)Installation Guide: iOS CFW GuideTechnical Insight: ElleKit - Tweak InjectionEBT & Mobile Fraud Analysis: The Mechanics of Theft: Propel: How EBT Benefits are StolenSystemic Vulnerabilities: Pennsylvania Office of State Inspector General🛡️ Sponsor This episode is brought to you by Approov. Is your mobile app running on a jailbroken device? Are bots scraping your API endpoints? Approov provides a comprehensive mobile security solution that ensures only genuine mobile app instances, running on safe mobile environments, can access your backend APIs. 👉 Learn more at: approov.com 🔍 SEO Keywords Dopamine Jailbreak, Rootless Jailbreak, iOS 15 Jailbreak, iOS 16 Security, Mobile App Security, EBT Fraud, Skimming, API Security, Sideloading, TrollStore, Magstripe Vulnerabilities, App Attestation. 🎙️ Upwardly Mobile is hosted by Skye & George. 🛡️ Sponsored by Approov: The only comprehensive solution for mobile app and API security. 👉 Subscribe & Review: Upwardly Mobile | Podcast This episode includes AI-generated content.

    14 min

About

Think the App Store’s built-in security is enough? Think again. Welcome to Upwardly Mobile, the podcast that exposes the gaps in iOS, Android, and HarmonyOS security. Hosts Skye and George take you into the high-stakes world of mobile defense, revealing why standard protections from Apple, Google, and Samsung often leave your sensitive data exposed. Sponsored by Approov—the gold standard in mobile app attestation—we move beyond the basics to tackle weaponized AI threats and dynamic API attacks. From runtime attestation to navigating complex compliance regulations, we equip developers and security pros with the actionable strategies needed to thwart attackers. Don’t leave your app vulnerable. Subscribe now on Spotify and Apple Podcasts to elevate your security game. This show includes AI-generated content.