Modern Australian
Men's Weekly

.

Jamf unveils 2025 Security 360 Report: A strategic look at Mac and mobile security risks

Report identifies phishing, infostealers, and OS vulnerabilities as top concerns for organizations

HONG KONG SAR - Media OutReach Newswire - 19 June 2025 - Jamf (NASDAQ: JAMF), the standard in managing and securing Apple at work, today released its Security 360 Report, separated into analyses for mobile and macOS environments.

The report spotlights the risks organizations are facing and offers insights for security leaders to consider when protecting their organizations at the user, device, application and network levels.

"Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked...nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community."

Threat trends facing mobile environments

For many employees, mobile devices are the sole devices used at work. Regardless of occupation, the modern workplace is about empowering employees to connect from anywhere, at any time and on any device. This requires raising awareness about the most pervasive threats facing mobile devices and taking tangible steps to keep bad actors at bay.

Jamf's mobile device threat analysis is structured into four categories found to be the highest priorities for organizations worldwide.

Mobile phishing

With mobile devices keeping us connected everywhere, attackers' reach continues to expand. Over 12 months, Jamf identified approximately 10 million phishing attacks, discovered that 25% of organizations were impacted by a social engineering attack, and 1 in 10 users clicked on a malicious phishing link. Training programs can be extremely valuable in mitigating phishing attacks, as can adopting a layered approach with zero-trust methodology.

Vulnerability management

Jamf discovered that 32% of organizations operate at least one device with critical vulnerabilities and 55.1% of mobile devices used at work are running on a vulnerable operating system (OS). Both Apple and Google routinely provide security updates to patch known vulnerabilities, and the best way to mitigate damage is to update devices accordingly.

Application risk and malware

Earlier this year, Jamf published research on a Transparency, Consent and Control (TCC) bypass vulnerability affecting iOS devices and published a demonstration of how a 'sideloaded' app (an app from a third-party app store) can infringe on users' privacy. The harsh reality is that using the latest OS is still not enough to protect your organization – good security practices must extend to the application layer as well.

Malware and spyware

High-profile users such as journalists, politicians and diplomats are often targeted by mercenary spyware attacks. Just last year, Apple sent notices of spyware compromise to users in approximately 100 countries. While malware is not as pervasive on mobile devices, when discovered, it is found to be extremely advanced and targeted. Organizations must treat mobile like every other endpoint and avoid getting complacent about the threat of mobile malware.

Threat trends facing macOS environments

What began as a machine for executives and creatives is becoming increasingly ingrained into the daily operations of enterprises across all industries worldwide. The threat landscape for Mac is more diverse than ever, and bad actors are only getting more creative with their attack methodologies. Jamf's Mac threat report analyzes the threat landscape affecting Macs and organizes the findings into three main categories:

Application risk and malware

Jamf discovered that infostealers accounted for 28.36% of all Mac malware Jamf examined, skyrocketing from accounting for just 0.25% in last year's report. Jamf's research is aligned with these findings. Employees of organizations in high-profile industries (like crypto), must remain vigilant from both a training and security tool standpoint.

Vulnerability management

Jamf Threat Labs has dispelled the myth that Mac is invincible multiple times, including just last year when the team discovered a vulnerability in Gatekeeper, a crucial component blocking apps downloaded from the internet that don't have a valid developer ID. Having the right controls and training is crucial for mitigating risks caused by vulnerabilities on macOS.

Social engineering

With Macs becoming more common at work, the attack surface continues to expand. Phishing is typically thought of as email-specific, which is far from the truth. In fact, Jamf Threat Labs published research discussing a campaign from the Democratic People's Republic of Korea (DPRK) that uses LinkedIn messaging as an initial lure. Training employees in the various forms of phishing that can impact the Mac environment is critical for avoiding fallout.

Methodology

Jamf examined 1.4 million devices protected by Jamf. The analysis was carried out in the first quarter of 2025, revisiting the prior 12-month period and spanning globally across 90 countries and multiple platforms – specifically, iOS and iPadOS and Android devices for mobile as well as Macs. The analysis in this report is informed by Jamf's Threat Intelligence, a broad collection of insights that are derived from original threat research, real-world usage metrics, along with news analysis and data feeds.

Hashtag: #Jamf

The issuer is solely responsible for the content of this announcement.

About Jamf

Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit jamf.com.

Maximising Operational Efficiency: Electric Winch Hire Australia and Hydraulic Power Pack Hire Solutions

Image by jcomp on Freepik From urban construction sites and remote mining operations to coastal maritime facilities, specialised equipment solutio...

Navigating the Digital Frontier: Managed IT Support and Cyber Security Services in Brisbane

As Brisbane develops its technology scene, the need for adequate IT infrastructure and security becomes apparent. This is how digital transformati...

Navigating the System: Your Guide to Support Finding Work with a Disability Around Melbourne

Image by freepik Finding the right job can be a challenge for anyone, but it can feel particularly daunting when you're also navigating life with a ...

Say Goodbye to Draughts and Hello to Savings: Your Guide to Perth Window Replacement

Image by prostooleh on Freepik Are your windows looking worse for wear? Are you paying a hefty power bill due to sneaky draughts and poor insulation...

How to Choose the Right Horse Trailer for Your Riding Needs

Many horse owners travel long distances for riding lessons, competitions, or to move horses between properties. Having a safe and reliable trailer i...

Sydney Turf Installer for Instant Green Lawns and Long-Term Performance

Having a green lawn at home makes everything look better. Whether it’s the front yard, backyard, or a small patch beside the driveway, people in S...

Designing Better Living Spaces: Why New Kitchens in the Blue Mountains Are in High Demand

The Blue Mountains region is seeing a steady rise in home upgrades. According to recent housing data, kitchen renovations remain one of the most req...

The Role of Packaging Manufacturers in Reducing Supply Chain Costs

In today’s fast-paced logistics and distribution landscape, businesses are under constant pressure to optimise operations and reduce expenses. One...

Customising Roller Shutters for Warehouses, Factories, and Logistics Hubs

In today’s fast-paced industrial and commercial environments, security, functionality, and efficiency are paramount. Whether you manage a busy log...

Top Fire Hazards in Commercial Buildings and How to Avoid Them

When it comes to protecting lives, assets, and business continuity, fire safety should be at the forefront of every commercial property owner’s ri...

Refillable Bottles and the Role of Reusable Caps in a Sustainable Packaging Future

As industries across the globe strive to reduce environmental impact, refillable bottles and reusable caps are emerging as champions of sustainable ...

The Comprehensive Guide to Physiotherapy: Benefits & Techniques

It employs hands-on care, movement and advice to aid recovery and prevent further issues. Individuals of all stages of life utilize physiotherapy for ...

What Can Be Funded by the NDIS? A Guide to Approved Supports

The National Disability Insurance Scheme (NDIS) is designed to empower Australians with disability by providing funding for supports that improve in...

10 Desserts That Aren’t Complete Without a Dollop of Whipped Cream

There’s something undeniably luxurious about a generous dollop of freshly whipped cream. Light, fluffy, and subtly sweet, it has the power to tran...

Why Personalised Ornaments Make the Perfect Christmas Gift

In a season brimming with sentiment and tradition, gift-giving is one of the most cherished ways to show we care. And while store-bought items can b...

What Causes Depression? Biological, Psychological, and Social Triggers Explained

Depression is a complex mental health condition that can impact every aspect of a person’s life—from sleep and energy levels to relationships an...

Brisbane Road Accident Lawyers and Bus Accident Compensation

Navigating the aftermath of a road accident in Brisbane, especially one involving a bus, can be a daunting experience. Whether you’re a passenger...

Freezer Room Hire in Perth: The Ultimate Solution for Reliable Cold Storage

Ever found yourself in a cold storage crisis and wondering how to save your perishables before they go bad?   Well, this isn't something new. Pe...