Modern Australian
Men's Weekly

.

Jamf unveils 2025 Security 360 Report: A strategic look at Mac and mobile security risks

Report identifies phishing, infostealers, and OS vulnerabilities as top concerns for organizations

HONG KONG SAR - Media OutReach Newswire - 19 June 2025 - Jamf (NASDAQ: JAMF), the standard in managing and securing Apple at work, today released its Security 360 Report, separated into analyses for mobile and macOS environments.

The report spotlights the risks organizations are facing and offers insights for security leaders to consider when protecting their organizations at the user, device, application and network levels.

"Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked...nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community."

Threat trends facing mobile environments

For many employees, mobile devices are the sole devices used at work. Regardless of occupation, the modern workplace is about empowering employees to connect from anywhere, at any time and on any device. This requires raising awareness about the most pervasive threats facing mobile devices and taking tangible steps to keep bad actors at bay.

Jamf's mobile device threat analysis is structured into four categories found to be the highest priorities for organizations worldwide.

Mobile phishing

With mobile devices keeping us connected everywhere, attackers' reach continues to expand. Over 12 months, Jamf identified approximately 10 million phishing attacks, discovered that 25% of organizations were impacted by a social engineering attack, and 1 in 10 users clicked on a malicious phishing link. Training programs can be extremely valuable in mitigating phishing attacks, as can adopting a layered approach with zero-trust methodology.

Vulnerability management

Jamf discovered that 32% of organizations operate at least one device with critical vulnerabilities and 55.1% of mobile devices used at work are running on a vulnerable operating system (OS). Both Apple and Google routinely provide security updates to patch known vulnerabilities, and the best way to mitigate damage is to update devices accordingly.

Application risk and malware

Earlier this year, Jamf published research on a Transparency, Consent and Control (TCC) bypass vulnerability affecting iOS devices and published a demonstration of how a 'sideloaded' app (an app from a third-party app store) can infringe on users' privacy. The harsh reality is that using the latest OS is still not enough to protect your organization – good security practices must extend to the application layer as well.

Malware and spyware

High-profile users such as journalists, politicians and diplomats are often targeted by mercenary spyware attacks. Just last year, Apple sent notices of spyware compromise to users in approximately 100 countries. While malware is not as pervasive on mobile devices, when discovered, it is found to be extremely advanced and targeted. Organizations must treat mobile like every other endpoint and avoid getting complacent about the threat of mobile malware.

Threat trends facing macOS environments

What began as a machine for executives and creatives is becoming increasingly ingrained into the daily operations of enterprises across all industries worldwide. The threat landscape for Mac is more diverse than ever, and bad actors are only getting more creative with their attack methodologies. Jamf's Mac threat report analyzes the threat landscape affecting Macs and organizes the findings into three main categories:

Application risk and malware

Jamf discovered that infostealers accounted for 28.36% of all Mac malware Jamf examined, skyrocketing from accounting for just 0.25% in last year's report. Jamf's research is aligned with these findings. Employees of organizations in high-profile industries (like crypto), must remain vigilant from both a training and security tool standpoint.

Vulnerability management

Jamf Threat Labs has dispelled the myth that Mac is invincible multiple times, including just last year when the team discovered a vulnerability in Gatekeeper, a crucial component blocking apps downloaded from the internet that don't have a valid developer ID. Having the right controls and training is crucial for mitigating risks caused by vulnerabilities on macOS.

Social engineering

With Macs becoming more common at work, the attack surface continues to expand. Phishing is typically thought of as email-specific, which is far from the truth. In fact, Jamf Threat Labs published research discussing a campaign from the Democratic People's Republic of Korea (DPRK) that uses LinkedIn messaging as an initial lure. Training employees in the various forms of phishing that can impact the Mac environment is critical for avoiding fallout.

Methodology

Jamf examined 1.4 million devices protected by Jamf. The analysis was carried out in the first quarter of 2025, revisiting the prior 12-month period and spanning globally across 90 countries and multiple platforms – specifically, iOS and iPadOS and Android devices for mobile as well as Macs. The analysis in this report is informed by Jamf's Threat Intelligence, a broad collection of insights that are derived from original threat research, real-world usage metrics, along with news analysis and data feeds.

Hashtag: #Jamf

The issuer is solely responsible for the content of this announcement.

About Jamf

Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit jamf.com.

How to Find the Best Real Estate Agent Near You on the Central Coast

Choosing the right real estate agent can make a major difference to your final sale price, days on market, and overall experience. The Central Coast...

Unlock Durability And Beauty With Burnt Timber Cladding Solutions

Imagine a home or commercial space that not only stands the test of time but also tells a story through its very facade. In the world of architectur...

Offroad Caravans: Built for Adventure Beyond the Beaten Track

Australia’s vast and varied landscapes invite travellers to explore far beyond sealed roads and crowded parks. Offroad caravans are purpose-built ...

The Expert's Guide to Understanding Large Bore Steel Pipe Specifications

When it comes to infrastructure, construction, and various industrial applications, the choice of materials is paramount. Among the options availabl...

Preparing for Your First Trip to San Francisco in 2026

San Francisco has long occupied a particular place in the Australian imagination. It is compact yet complex, progressive but historic, and visually st...

Modern Office Painting in Australia - It's the Real Game Changer

Walk into any modern Australian office today and you'll be struck by the fact it's a whole different beast from the ones we grew up with. Gone are t...

How to Choose the Right Suburb for Your Lifestyle

Choosing the right suburb is one of the most important decisions you’ll make when buying or renting a home. Beyond the property itself, the suburb...

Considering Cryolipolysis Fat Freezing? Here’s What You Need to Know

Body confidence can shift over time, and sometimes even good diet and training can still leave a stubborn area of fat that won’t budge. If you’r...

From Local Tradie to Digital Leader: The Strategy Behind Auto Gate Guys Sydney’s Growth

For many small trade businesses, digital marketing still feels like a buzzword, not a necessity. They rely on word-of-mouth referrals, repeat clients...

Electric Automation System: Smarter Control for Modern Electrical Infrastructure

Modern buildings and industrial facilities are increasingly dependent on intelligent control and efficiency. An electric automation system brings t...

The Damp Truth: Why Your Overflowing Gutters Are an Open Invitation for Termites

When it comes to protecting your home, most people think about visible threats — storm damage, cracked tiles, break-ins. But one of the most destruc...

Is Your Inventory a Sitting Duck? 2 Critical Upgrades to Protect Your Business Assets and Your Bottom Line

Imagine this: you finish a long day on the job, lock up your tools, materials, and work vehicle in the garage, and head home. But overnight, someone b...

Electrician in Melbourne: Reliable Electrical Solutions for Homes and Businesses

Finding a dependable electrician Melbourne is essential when safety, efficiency, and long-term performance matter. Electrical systems form the back...

Rims and Tyres for Sale in Sydney: Performance, Safety, and Style Combined

Finding the right rims and tyres for sale Sydney is about far more than appearance. Tyres and rims directly influence how a vehicle handles, brakes...

Why Access to Doctors in Bundoora Is Essential for Ongoing Community Health

Reliable access to healthcare plays a vital role in maintaining physical wellbeing and peace of mind. Having trusted doctors in Bundoora available ...

Pendant Lights: Elevating Interior Spaces With Style and Purpose

Well-chosen pendant lights have the power to transform interiors by combining focused illumination with strong visual impact. More than just a ligh...

What Sets Professional Family Lawyers in Sydney Apart from General Lawyers?

Choosing the right legal support can make a noticeable difference when dealing with family-related matters. This article will explore what separates...

Balancing Teen Academic Expectations and Wellbeing

For many teenagers, school years are shaped by increasing expectations. Academic performance, future pathways, and comparison with peers can create pr...