Modern Australian
Times Advertising

Jamf unveils 2025 Security 360 Report: A strategic look at Mac and mobile security risks

Report identifies phishing, infostealers, and OS vulnerabilities as top concerns for organizations

HONG KONG SAR - Media OutReach Newswire - 19 June 2025 - Jamf (NASDAQ: JAMF), the standard in managing and securing Apple at work, today released its Security 360 Report, separated into analyses for mobile and macOS environments.

The report spotlights the risks organizations are facing and offers insights for security leaders to consider when protecting their organizations at the user, device, application and network levels.

"Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organizations against increasingly sophisticated attacks," said Josh Stein, VP of Product Strategy at Jamf. "Age-old threats like phishing remain extremely prevalent and cannot be overlooked...nor can threats skyrocketing in popularity like infostealers. Jamf remains deeply committed to continuous threat research to not only protect our customers but also contribute valuable insights to the broader security community."

Threat trends facing mobile environments

For many employees, mobile devices are the sole devices used at work. Regardless of occupation, the modern workplace is about empowering employees to connect from anywhere, at any time and on any device. This requires raising awareness about the most pervasive threats facing mobile devices and taking tangible steps to keep bad actors at bay.

Jamf's mobile device threat analysis is structured into four categories found to be the highest priorities for organizations worldwide.

Mobile phishing

With mobile devices keeping us connected everywhere, attackers' reach continues to expand. Over 12 months, Jamf identified approximately 10 million phishing attacks, discovered that 25% of organizations were impacted by a social engineering attack, and 1 in 10 users clicked on a malicious phishing link. Training programs can be extremely valuable in mitigating phishing attacks, as can adopting a layered approach with zero-trust methodology.

Vulnerability management

Jamf discovered that 32% of organizations operate at least one device with critical vulnerabilities and 55.1% of mobile devices used at work are running on a vulnerable operating system (OS). Both Apple and Google routinely provide security updates to patch known vulnerabilities, and the best way to mitigate damage is to update devices accordingly.

Application risk and malware

Earlier this year, Jamf published research on a Transparency, Consent and Control (TCC) bypass vulnerability affecting iOS devices and published a demonstration of how a 'sideloaded' app (an app from a third-party app store) can infringe on users' privacy. The harsh reality is that using the latest OS is still not enough to protect your organization – good security practices must extend to the application layer as well.

Malware and spyware

High-profile users such as journalists, politicians and diplomats are often targeted by mercenary spyware attacks. Just last year, Apple sent notices of spyware compromise to users in approximately 100 countries. While malware is not as pervasive on mobile devices, when discovered, it is found to be extremely advanced and targeted. Organizations must treat mobile like every other endpoint and avoid getting complacent about the threat of mobile malware.

Threat trends facing macOS environments

What began as a machine for executives and creatives is becoming increasingly ingrained into the daily operations of enterprises across all industries worldwide. The threat landscape for Mac is more diverse than ever, and bad actors are only getting more creative with their attack methodologies. Jamf's Mac threat report analyzes the threat landscape affecting Macs and organizes the findings into three main categories:

Application risk and malware

Jamf discovered that infostealers accounted for 28.36% of all Mac malware Jamf examined, skyrocketing from accounting for just 0.25% in last year's report. Jamf's research is aligned with these findings. Employees of organizations in high-profile industries (like crypto), must remain vigilant from both a training and security tool standpoint.

Vulnerability management

Jamf Threat Labs has dispelled the myth that Mac is invincible multiple times, including just last year when the team discovered a vulnerability in Gatekeeper, a crucial component blocking apps downloaded from the internet that don't have a valid developer ID. Having the right controls and training is crucial for mitigating risks caused by vulnerabilities on macOS.

Social engineering

With Macs becoming more common at work, the attack surface continues to expand. Phishing is typically thought of as email-specific, which is far from the truth. In fact, Jamf Threat Labs published research discussing a campaign from the Democratic People's Republic of Korea (DPRK) that uses LinkedIn messaging as an initial lure. Training employees in the various forms of phishing that can impact the Mac environment is critical for avoiding fallout.

Methodology

Jamf examined 1.4 million devices protected by Jamf. The analysis was carried out in the first quarter of 2025, revisiting the prior 12-month period and spanning globally across 90 countries and multiple platforms – specifically, iOS and iPadOS and Android devices for mobile as well as Macs. The analysis in this report is informed by Jamf's Threat Intelligence, a broad collection of insights that are derived from original threat research, real-world usage metrics, along with news analysis and data feeds.

Hashtag: #Jamf

The issuer is solely responsible for the content of this announcement.

About Jamf

Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit jamf.com.

What People Mean by “Alternative Doctor” And Why Expectations Around Care Are Changing

When people search for an “alternative doctor,” they’re usually looking for something specific, even if they haven’t fully defined it yet. I...

Why Does My Power Keep Tripping? Common Causes Explained by Electricians Sydney

The electrical system is the lifeblood of your home, powering everything from your phones to cooking utensils and more. But from time to time, your po...

Interstate Car Transporter Urges Buyers to Book Early

As the conflict in the Middle East continues to put increasing pressure on local fuel supply, Australian transport companies are experiencing increasi...

Digital Minimalism for Business Owners: Fewer Tools, Better Systems

Be honest. How many apps are open right now? One for scheduling, another for invoices, a third for customer notes, plus a spreadsheet someone email...

The Importance Of Proactive NDIS Renewal Preparation For Sustaining Your Provider Business

Your NDIS renewal notice is not a signal to start preparing. By the time it arrives, preparation should already be well underway. For new providers, s...

Why Fire Extinguisher Testing in Sydney Is Becoming a Records Game, Not Only a Maintenance Job

A fire extinguisher used to feel like one of the simpler parts of building safety. It hung on the wall, wore a service tag, and sat there quietly unle...

The Switchboard Upgrade Question Every Melbourne Renovator Should Ask Before the Walls Close Up

Renovations have a funny way of making people think on surfaces first. Splashback, stone, joinery, tapware, paint. Fair enough too. That is the exciti...

Winter Sanitation Gaps in Parramatta Kitchens: A Hidden Pest Risk

Winter brings a host of changes to our homes, from the chill in the air to the cozy warmth indoors. However, this season also introduces sanitation ch...

When to Seek Advice from Employment Lawyers in Melbourne

Australian employment law is detailed and, at times, complex, with rights and obligations that aren't always obvious to employees or employers witho...

7 Benefits of Professional Gutter Cleaning for Australian Homeowners

Gutters aren't exactly glamorous. They sit up there on the edge of your roof, doing their job quietly - until they stop working. Clogged, overflowing ...

Pipe Floats Strengthening Pipeline Performance In Demanding Environments

Pipelines often travel through environments that are anything but predictable, water currents shift, terrain changes, and materials keep moving unde...

Why Ceiling Fans Are Essential For Comfort, Efficiency, And Modern Living

Creating a comfortable indoor environment is not just about temperature; it is about how air moves, how a room feels, and how efficiently energy is ...

Why Duct Cleaning In Melbourne Is A Smart Investment For Healthier Living Spaces

Behind your walls, ceilings, and vents lies a network quietly working every day to keep your home comfortable. Yet over time, this system can become...

Disability Service Providers Supporting Inclusive And Independent Living

Finding the right support system can feel like assembling a puzzle where every piece must fit just right. For individuals and families navigating di...

A Beginner's Guide to Owning a Caravan in Australia

Owning a caravan opens up a style of travel that's hard to match for freedom and flexibility. However, for those just starting out, the process of c...

Preparing Your Air Conditioner for Summer: What Most Homeowners Overlook

As temperatures rise, many homeowners switch on their air conditioning for the first time in months — only to find it’s not performing the way i...

What Actually Adds Value to Properties in Newcastle

Newcastle has seen steady growth over the past few years, with more buyers looking beyond Sydney for lifestyle, space, and long-term value. As dema...

What is Design and Build in Construction?

Imagine you’re about to start a new construction project, maybe it’s a custom home or a commercial building. You’ve got the idea, the land, an...