Automatically patch Mac vulnerabilities based on severity with Kandji’s new Vulnerability Response—no more manual tickets or delayed updates.| blog.kandji.io
Key WWDC 2025 updates for Apple IT: Setup Assistant + SSO, declarative management, ABM migration, and more.| blog.kandji.io
New research from 115 IT professionals shows how teams are responding to Shadow IT—with better visibility, smarter processes, and policy changes.| blog.kandji.io
Kandji will use the latest round of funding from General Catalyst to accelerate innovation in Apple device management and security for the enterprise.| blog.kandji.io
Kandji's threat research team has discovered a piece of malware that combines aspects of an infostealer and spyware. Here's how it works.| blog.kandji.io
Kandji security researchers find code in a messaging app that will seek and upload crypto keys stored on Mac computers.| blog.kandji.io
The scripts that macOS uses to install new apps have known vulnerabilities. Fortunately, Apple has come up with a clever solution to mitigate them.| blog.kandji.io
Kandji threat analysis reveals how the AMOS macOS stealer constantly changes its hash signatures while maintaining its functionality.| blog.kandji.io