Jamf Blog

Posts in the Security Category

May 26, 2022 by Jesus Vigo

Welcome to another installment of the macOS Security Basics series! In this segment, Jamf shines a light on macOS security, more specifically, we discuss the basics that go into fortifying your Mac device, including misconceptions and long-held beliefs that just aren’t quite true or simply do not fit in with the modern-day computing environment.

The topic of choice this time around? Updating your macOS – more specifically – the incorrect belief that Mac (and Apple devices, et al.) don’t need updates, because they’re designed to be inherently safe.

May 25, 2022 by Jesus Vigo

Marking its fifteenth year, Verizon’s Data Breach Investigations Report analyzes data breach demographics spread across multiple industry verticals, providing results based on breach cases and incidents reviewed. The data gleaned from its analysis provides organizations insight into what threat types are driving attacks and how trends play a significant role over time in security. Additional guidance is provided based on quantifiable data from industry leaders, such as Jamf. Verizon also includes security recommendations, indicators of compromise and next steps to take after a breach has been identified, from very small businesses to large enterprises.

May 16, 2022 by Jamf Threat Labs

The Jamf Threat Labs team has recently identified changes to the UpdateAgent malware dropper. These changes primarily focus on new executables written in Swift that reach out to a registration server to pull down a new set of instructions in the form of a bash script. Perhaps one of the most identifiable features of the malware is that it relies on the AWS infrastructure to host its various payloads and perform its infection status updates to the server. The continued development of this malware shows that its authors continue to remain active, trying to reach as many users as possible.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.