AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Apple mobile device management3/15/2024 ![]() ![]() "Leveraging this authentication weakness, an attacker can potentially enroll any device into an organization's MDM server-which could allow them to obtain privileged access used to further pivot within the network," Barclay wrote in a blog post on the research posted today. "A malicious actor can potentially enroll an arbitrary device into an organization’s MDM server. And as the Duo researchers found, they can be turned against an organization if too much trust is put into them-because many rely solely on the serial number to ensure that the device is allowed to join a corporate network. ![]() Further Reading Weakness in iOS enterprise hooks could let bad apps sneak inWhile MDM systems are often used to lock down devices with organizationally mandated policies and distribute certificates to gain access to virtual private networks, they're not always a guarantee of device security and have also been used for malicious purposes. ![]()
0 Comments
Read More
Leave a Reply. |