Jamf Blog

1947 more articles are waiting for you.

Applications, such as software updaters, are still using the AuthorizationExecuteWithPrivileges API against Apple’s recommendation and do so. Recent research has shown that this can be leveraged by attackers to compromise endpoints in real-world scenarios. Jamf has been busy investigating how security teams can monitor for malicious use of this API. Let us show you how.

April 13 2020 by

Jaron Bradley

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.