• About
  • Subscribe
  • Contact
Monday, June 23, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Phishing and OS vulnerabilities top security concerns

FutureCISO Editors by FutureCISO Editors
June 23, 2025
Phishing and OS vulnerabilities top security concerns

Photo by seppe machielsen: https://www.pexels.com/photo/glow-in-the-dark-keyboard-14011035/

Share on FacebookShare on Twitter

Jamf has released its Security 360 Report, analysing security risks for both mobile and macOS environments. The report identifies critical threats such as phishing, infostealers, and operating system vulnerabilities that organizations must address to enhance their security posture.

Josh Stein, VP of Product Strategy at Jamf, emphasised the importance of this research in informing security leaders about the risks impacting their organisations.

“Our goal with this research is to inform security leaders about the risks impacting their organizations – whether those risks impact Mac or mobile – and provide tangible recommendations for safeguarding their organisations against increasingly sophisticated attacks,” he stated.

Threat trends facing mobile environments

As mobile devices become the primary work tools for many employees, understanding the threats they face is vital. Jamf's mobile device threat analysis categorises four key areas of concern:

  1. Mobile phishing: Over the past year, Jamf recorded approximately 10 million phishing attacks, with 25% of organisations impacted by social engineering attacks. Alarmingly, 1 in 10 users clicked on a malicious link. Training programmes are essential in mitigating these risks, alongside a layered zero-trust approach.
  2. Vulnerability management: The report revealed that 32% of organisations have at least one device with critical vulnerabilities, and 55.1% of mobile devices are running on vulnerable operating systems. Regular security updates from Apple and Google are crucial for mitigating these vulnerabilities.
  3. Application risk and malware: Recent research highlighted a bypass vulnerability affecting iOS devices. It underlines that using the latest OS is insufficient; robust security practices must extend to the application layer.
  4. Malware and spyware: High-profile users, including journalists and politicians, are frequent targets of sophisticated spyware. Apple notified users of spyware compromises in around 100 countries last year, indicating the seriousness of mobile malware threats.
Related:  Cybercriminals wiped out telemetry logs in 82% of attacks

Threat trends facing macOS environments

The report also addresses the evolving threat landscape for macOS. The findings are organised into three main categories:

  1. Application risk and malware: Infostealers now account for 28.36% of all Mac malware analysed, up from just 0.25% last year. Employees in high-profile industries must be vigilant against these threats.
  2. Vulnerability management: Jamf has repeatedly dispelled the myth of Mac invincibility, discovering vulnerabilities in critical components like Gatekeeper. Proper controls and training are essential for risk mitigation.
  3. Social engineering: As Macs become more prevalent in workplaces, the attack surface expands. Phishing attempts are diversifying beyond email, including tactics like LinkedIn messaging.

Jamf's report is based on an analysis of 1.4 million devices protected by its services, encompassing data from 90 countries. The findings underscore the need for comprehensive security measures tailored to both mobile and Mac environments.

According to a report by Cybersecurity Ventures, cybercrime is projected to cost the world $10.5 trillion annually by 2025, reinforcing the urgency of addressing these security risks.

Tags: application vulnerabilitiesJamfmalwareOS vulnerabilitiesphishingsocial engineeringspywarevulnerability management
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Phishing and OS vulnerabilities top security concerns
  • Modern private cloud solutions enhance security and agility
  • How organisations should transform their cybersecurity strategy for agentic AI
  • Indonesia gets comprehensive device protection
  • PodChats for FutureCISO: AI-powered ransomware: Time to rethink data resilience

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl