Modern Australian
Men's Weekly

.

Jamf unveils 2025 Security 360 Report: A strategic look at Mac and mobile security risks

Report identifies phishing, infostealers, and OS vulnerabilities as top concerns for organizations

HONG KONG SAR - Media OutReach Newswire - 19 June 2025 - Jamf (NASDAQ: JAMF), the standard in managing and securing Apple at work, today released its Security 360 Report, separated into analyses for mobile and macOS environments.

The report spotlights the risks organizations are facing and offers insights for security leaders to consider when protecting their organizations at the user, device, application and network levels.

"Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked...nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community."

Threat trends facing mobile environments

For many employees, mobile devices are the sole devices used at work. Regardless of occupation, the modern workplace is about empowering employees to connect from anywhere, at any time and on any device. This requires raising awareness about the most pervasive threats facing mobile devices and taking tangible steps to keep bad actors at bay.

Jamf's mobile device threat analysis is structured into four categories found to be the highest priorities for organizations worldwide.

Mobile phishing

With mobile devices keeping us connected everywhere, attackers' reach continues to expand. Over 12 months, Jamf identified approximately 10 million phishing attacks, discovered that 25% of organizations were impacted by a social engineering attack, and 1 in 10 users clicked on a malicious phishing link. Training programs can be extremely valuable in mitigating phishing attacks, as can adopting a layered approach with zero-trust methodology.

Vulnerability management

Jamf discovered that 32% of organizations operate at least one device with critical vulnerabilities and 55.1% of mobile devices used at work are running on a vulnerable operating system (OS). Both Apple and Google routinely provide security updates to patch known vulnerabilities, and the best way to mitigate damage is to update devices accordingly.

Application risk and malware

Earlier this year, Jamf published research on a Transparency, Consent and Control (TCC) bypass vulnerability affecting iOS devices and published a demonstration of how a 'sideloaded' app (an app from a third-party app store) can infringe on users' privacy. The harsh reality is that using the latest OS is still not enough to protect your organization – good security practices must extend to the application layer as well.

Malware and spyware

High-profile users such as journalists, politicians and diplomats are often targeted by mercenary spyware attacks. Just last year, Apple sent notices of spyware compromise to users in approximately 100 countries. While malware is not as pervasive on mobile devices, when discovered, it is found to be extremely advanced and targeted. Organizations must treat mobile like every other endpoint and avoid getting complacent about the threat of mobile malware.

Threat trends facing macOS environments

What began as a machine for executives and creatives is becoming increasingly ingrained into the daily operations of enterprises across all industries worldwide. The threat landscape for Mac is more diverse than ever, and bad actors are only getting more creative with their attack methodologies. Jamf's Mac threat report analyzes the threat landscape affecting Macs and organizes the findings into three main categories:

Application risk and malware

Jamf discovered that infostealers accounted for 28.36% of all Mac malware Jamf examined, skyrocketing from accounting for just 0.25% in last year's report. Jamf's research is aligned with these findings. Employees of organizations in high-profile industries (like crypto), must remain vigilant from both a training and security tool standpoint.

Vulnerability management

Jamf Threat Labs has dispelled the myth that Mac is invincible multiple times, including just last year when the team discovered a vulnerability in Gatekeeper, a crucial component blocking apps downloaded from the internet that don't have a valid developer ID. Having the right controls and training is crucial for mitigating risks caused by vulnerabilities on macOS.

Social engineering

With Macs becoming more common at work, the attack surface continues to expand. Phishing is typically thought of as email-specific, which is far from the truth. In fact, Jamf Threat Labs published research discussing a campaign from the Democratic People's Republic of Korea (DPRK) that uses LinkedIn messaging as an initial lure. Training employees in the various forms of phishing that can impact the Mac environment is critical for avoiding fallout.

Methodology

Jamf examined 1.4 million devices protected by Jamf. The analysis was carried out in the first quarter of 2025, revisiting the prior 12-month period and spanning globally across 90 countries and multiple platforms – specifically, iOS and iPadOS and Android devices for mobile as well as Macs. The analysis in this report is informed by Jamf's Threat Intelligence, a broad collection of insights that are derived from original threat research, real-world usage metrics, along with news analysis and data feeds.

Hashtag: #Jamf

The issuer is solely responsible for the content of this announcement.

About Jamf

Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit jamf.com.

5 Essential Tips for Hiring Gold Coast Plumbers

Finding the best plumber on the Gold Coast can be as complex as navigating a network of pipes, requiring an expert who is capable, reliable, and s...

Hidden Costs of Moving You Need to Budget For (And How to Avoid Them)

Moving house ranks among life's most busy experiences, and discovering unexpected expenses along the way certainly doesn't help with stress levels. Wh...

Understanding Australian Building Regulations: What Every Mornington Builder Wants You to Know

If you live on the Mornington Peninsula, you likely already feel the risk of bushfires,hot, dry summers, nearby bushland, and epic wind events. That...

Top 5 Home Exercises Recommended by Chiropractors for Better Posture

In today’s world of endless screen time and back-to-back Zoom meetings, it’s no surprise that posture-related issues are on the rise. From achin...

Simple Home Exercises to Manage Chronic Pain and Improve Mobility

Living with chronic pain doesn’t have to mean a life of limitation. Many people struggling with persistent discomfort find themselves moving less...

Smart Renovation Tips for a Sleek, Low-Maintenance Interior

In a world where time is tight and stress is high, our homes should feel like a refuge not another to-do list. That’s why smart renovations are tr...

Stay Cool in Queensland: The Complete Guide to Choosing the Right Air Conditioner

Introduction Queensland’s warm, humid climate makes a reliable air conditioning system an essential part of daily life. Whether you’re creating a...

Proving Partner Visas with Lawyers and Solid Evidence

You’re ready to build a life with your partner in Australia but the visa process quickly turns something personal into something official. Suddenl...

The History and Philosophy Behind Osteopathic Medicine

Osteopathy is more than just a hands-on approach to relieving pain—it’s a holistic health philosophy with roots in history, science, and a deep ...

Common Bathroom Renovation Mistakes and How to Avoid Them

Renovating a bathroom can be one of the most rewarding home improvement projects, offering both enhanced functionality and a fresh aesthetic. Howeve...

5 Simple Home Modifications to Support Occupational Therapy Goals

Every year, thousands of Australians face mobility challenges, chronic pain, or sensory issues that make daily tasks difficult. Simple changes at ho...

The Cost of Converting a Shipping Container into a Liveable Space

Container conversions often require more planning and labour than expected Early costs include foundations, framing, and structural reinforceme...

Marriage Celebrant for Modern Lovers Who Want Something Different

Many couples today feel pressure to follow the same wedding traditions their parents or grandparents did. They might sit through long ceremonies that ...

Why Everyone’s Signing Up for Fitstop’s 6-Week Challenge (Again)

Hint: It’s not just for the gains. Somewhere between the endless TikTok fitness hacks and the unrealistic “30-day shred” promises, we forgot ...

The Mental & Financial Benefits of Minimalist Caravan Travel

Minimalist caravan travel has grown in popularity, not just for its practical appeal but also for the sense of freedom it brings. With the rise of c...

Sydney Property Lawyers: Your Complete Guide to Smooth Transactions

Navigating the Sydney property market can feel like traversing a minefield, can't it? The process, laden with legal jargon and complex procedures, o...

Electrician Perth: Your Go-To Guide for Home Electrical Safety

When it comes to keeping your home safe and sound, electricity is something you simply can't afford to ignore. Faulty wiring, outdated switchboards...

Why More Homes and Businesses Are Choosing an Electric Sliding Door

Convenience, aesthetics, and technology often go hand in hand when it comes to architectural choices. One solution that delivers all three is the el...