Jamf Blog

Posts in the Security Category

May 26, 2022 by Jesus Vigo

Mac security series: Mac is inherently safer (doesn’t require frequent updates)

Welcome to another installment of the macOS Security Basics series! In this segment, Jamf shines a light on macOS security, more specifically, we discuss the basics that go into fortifying your Mac device, including misconceptions and long-held beliefs that just aren’t quite true or simply do not fit in with the modern-day computing environment.

The topic of choice this time around? Updating your macOS – more specifically – the incorrect belief that Mac (and Apple devices, et al.) don’t need updates, because they’re designed to be inherently safe.

May 25, 2022 by Jesus Vigo

2022 Verizon Data Breach Investigations Report Summary

Marking its fifteenth year, Verizon’s Data Breach Investigations Report analyzes data breach demographics spread across multiple industry verticals, providing results based on breach cases and incidents reviewed. The data gleaned from its analysis provides organizations insight into what threat types are driving attacks and how trends play a significant role over time in security. Additional guidance is provided based on quantifiable data from industry leaders, such as Jamf. Verizon also includes security recommendations, indicators of compromise and next steps to take after a breach has been identified, from very small businesses to large enterprises.

May 16, 2022 by Jamf Threat Labs

UpdateAgent Adapts Again

The Jamf Threat Labs team has recently identified changes to the UpdateAgent malware dropper. These changes primarily focus on new executables written in Swift that reach out to a registration server to pull down a new set of instructions in the form of a bash script. Perhaps one of the most identifiable features of the malware is that it relies on the AWS infrastructure to host its various payloads and perform its infection status updates to the server. The continued development of this malware shows that its authors continue to remain active, trying to reach as many users as possible.

May 11, 2022 by Haddayr Copley-Woods

How to mitigate cyber attacks in healthcare

Healthcare organizations are a particularly tempting target for cyber attackers. How can healthcare organizations prevent cyber attacks? And how can these organizations be ready to mitigate the damage when they detect one?

May 10, 2022 by Jamf Threat Labs

NukeSped malware a dud, thanks to Jamf Protect

Jamf protects against the most recent findings on Lazerous Group malware targeting macOS. CISA recently posted findings on a handful of malicious applications they refer to as TraderTraitor and many vendors detect as NukeSped malware.

May 10, 2022 by Jamf Threat Labs

Jamf protects against oRAT malware

Trend Micro researchers recently documented a new piece of malware by an APT threat actor named Earth Berberokawhich targets gambling websites.

May 9, 2022 by Jesus Vigo

What is Jamf Threat Labs?

Meet the team of experienced threat researchers, cybersecurity experts and data scientists focus on delivering the best, most secure experience to Jamf customers. And how the work of the Jamf Threat Labs helps organizations and users alike succeed with Apple, safely and securely.

May 4, 2022 by Jesus Vigo

10 things to know about Mi:RIAM: threat machine learning engine.

Machine Learning is not just a buzzword, but a truly helpful technology that works to supercharge your organization’s security solutions by using algorithms and statistical models to analyze data, like the volume and complexity of a cyberattack in real-time – even stopping data breaches before they can occur.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.